{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T15:18:17Z","timestamp":1649085497959},"reference-count":21,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T00:00:00Z","timestamp":1580342400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8,20]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Recently, Tseng et al. proposed a new notion for identity-based signature (IBS) scheme to resist ephemeral secret leakage (ESL) attacks, called leakage-free identity-based signature (leakage-free IBS), and devised the first secure leakage-free IBS scheme. However, they only considered the situation of the leakage of ephemeral secrets used for generating the signatures. Notice that the private key extraction procedure is probabilistic as well in their scheme, that is, there are ephemeral secrets used by the key generation center to generate the signers\u2019 private keys. It is practical to consider that if the adversary comprises these ephemeral secrets, then he can reveal the master key of the system. Therefore, it is desired to introduce a new security notion for the leakage-free IBS schemes to consider the ESL attacks on both private key extraction and signing procedures. In this paper, we present such security notion. Moreover, we propose two IBS schemes that are proved to be secure under the new security notion.<\/jats:p>","DOI":"10.1093\/comjnl\/bxz160","type":"journal-article","created":{"date-parts":[[2019,11,29]],"date-time":"2019-11-29T12:09:45Z","timestamp":1575029385000},"page":"1263-1270","source":"Crossref","is-referenced-by-count":0,"title":["Leakage-free ID-Based Signature, Revisited"],"prefix":"10.1093","volume":"63","author":[{"given":"Xi-Jun","family":"Lin","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China. Qingdao 266100, P.R.China"}]},{"given":"Lin","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Liberal Arts, Qingdao University. Qingdao 266071, P.R.China"}]},{"given":"Haipeng","family":"Qu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China. Qingdao 266100, P.R.China"}]}],"member":"286","published-online":{"date-parts":[[2020,1,30]]},"reference":[{"key":"2020081712165018400_ref1","first-page":"62","article-title":"Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols","volume-title":"Proc. CCS\u201993","author":"Bellare","year":"1993"},{"key":"2020081712165018400_ref2","first-page":"268","article-title":"Security Proofs for Identity-Based Identification and Signature Schemes","volume-title":"Proc. Eurocrypt\u201904","author":"Bellare","year":"2004"},{"key":"2020081712165018400_ref3","first-page":"213","article-title":"Identity-Based Encryption from the Weil Pairing","volume-title":"Proc. Crypto\u201901","author":"Boneh","year":"2001"},{"key":"2020081712165018400_ref4","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1145\/1008731.1008734","article-title":"The random oracle methodology, revisited","volume":"51","author":"Canetti","year":"2004","journal-title":"J. ACM"},{"key":"2020081712165018400_ref5","first-page":"18","article-title":"An Identity-Based Signature from Gap Diffie\u2013Hellman Groups","volume-title":"Proc. PKC\u201903","author":"Cha","year":"2003"},{"key":"2020081712165018400_ref6","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1093\/comjnl\/bxr086","article-title":"Improved anonymous multi-receiver identity-based encryption","volume":"55","author":"Chien","year":"2012","journal-title":"Comput. J."},{"key":"2020081712165018400_ref7","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","article-title":"Identity-based key agreement protocols from pairings","volume":"6","author":"Chen","year":"2007","journal-title":"Int. J. Inf. Secur."},{"key":"2020081712165018400_ref8","doi-asserted-by":"crossref","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","article-title":"Pairings for cryptographers","volume":"156","author":"Galbraith","year":"2008","journal-title":"Discrete Appl. Math."},{"key":"2020081712165018400_ref9","first-page":"310","article-title":"Efficient Identity-Based Signature Schemes Based on Pairings","volume-title":"Proc. SAC\u201902","author":"Hess","year":"2002"},{"key":"2020081712165018400_ref10","first-page":"546","article-title":"HMQV: A High-Performance Secure Diffie\u2013Hellman Protocol","volume-title":"Int. Conf. on Advances in Cryptology","author":"Krawczyk","year":"2005"},{"key":"2020081712165018400_ref11","first-page":"1","volume-title":"Stronger Security of Authenticated Key Exchange. Proc. ProvSec\u201907, Wollongong, Australia, November 1\u20132","author":"La Macchia","year":"2007"},{"key":"2020081712165018400_ref12","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1049\/el:20020682","article-title":"ID-based signatures from pairings on elliptic curves","volume":"38","author":"Paterson","year":"2002","journal-title":"Electron. Lett."},{"key":"2020081712165018400_ref13","first-page":"387","article-title":"Security Proofs for Signature Schemes","volume-title":"Proc. Eurocrypt\u201996","author":"Pointcheval","year":"1996"},{"key":"2020081712165018400_ref14","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","article-title":"Security arguments for digital signatures and blind signatures","volume":"13","author":"Pointcheval","year":"2000","journal-title":"J. Cryptol."},{"key":"2020081712165018400_ref15","first-page":"47","article-title":"Identity-Based Cryptosystem and Signature Schemes","volume-title":"Proc. of CRYPTO 84, California, USA, August 19\u201322","author":"Shamir","year":"1984"},{"key":"2020081712165018400_ref16","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1093\/comjnl\/bxr098","article-title":"Efficient revocable ID-based encryption with a public channel","volume":"55","author":"Tseng","year":"2012","journal-title":"Comput. J."},{"key":"2020081712165018400_ref17","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1093\/comjnl\/bxt116","article-title":"Leakage-free ID-based signature","volume":"58,","author":"Tseng","year":"2015","journal-title":"Comput. J."},{"key":"2020081712165018400_ref18","doi-asserted-by":"crossref","first-page":"481","DOI":"10.15388\/Informatica.2012.371","article-title":"A fully secure revocable ID-based encryption in the standard model","volume":"23","author":"Tsai","year":"2012","journal-title":"Informatica"},{"key":"2020081712165018400_ref19","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/LCOMM.2002.808397","article-title":"An identity-based signature scheme from the weil pairing","volume":"7","author":"Yi","year":"2003","journal-title":"IEEE Commun. Lett."},{"key":"2020081712165018400_ref20","first-page":"114","article-title":"Efficient Identity-Based Encryption without Random Oracles","volume-title":"Proc. Eurocrypt\u201905","author":"Waters","year":"2005"},{"key":"2020081712165018400_ref21","doi-asserted-by":"crossref","first-page":"2994","DOI":"10.1016\/j.comnet.2012.05.011","article-title":"A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants","volume":"56","author":"Wu","year":"2012","journal-title":"Comput. Netw."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/63\/8\/1263\/33657127\/bxz160.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/63\/8\/1263\/33657127\/bxz160.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T16:41:49Z","timestamp":1597682509000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/63\/8\/1263\/5716157"}},"subtitle":[],"editor":[{"given":"Kaitai","family":"Liang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,1,30]]},"references-count":21,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2020,1,30]]},"published-print":{"date-parts":[[2020,8,20]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxz160","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2020,8]]},"published":{"date-parts":[[2020,1,30]]}}}