期刊文献+

基于完全二叉树的入侵弹性签名方案 被引量:1

Intrusion-resilient Signature Scheme Based on Complete Binary Tree
下载PDF
导出
摘要 入侵弹性技术通过周期性地进化密钥,有效地防止了密钥泄漏带来的危害。利用完全二叉树提出了一个新的入侵弹性签名方案(TB IRS),并且证明了方案的正确性和安全性。TB IRS按照二叉树前序遍历的方式进行密钥的更新,采用随机数加减的方法进行密钥的刷新,以二叉树的叶子节点作为密码系统的时间周期。与目前密钥安全性最好的S iB IR方案比较,TB IRS在取得相同密钥安全性的情况下,算法复杂度却由O(N)降低到O(logN)。 Through periodically evolving key,intrusion-resilient technique can powerfully defend the threat of key exposure.A new tree-based intrusion-resilient signature scheme(TBIRS) was proposed,and the correctness and security of TBIRS were testified.In the TBIRS,the pre-order traversal of binary tree was applied to the key updating,random number was adopted in the key refreshing and the leaves were time periods.As compared with the most secure SiBIR scheme to date,TBIRS can achieve the same key security,but the a...
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2008年第4期160-165,共6页 Journal of Sichuan University (Engineering Science Edition)
基金 四川省科技厅青年软件创新工程资助项目(2004AA03692005AA0827)
关键词 完全二叉树 入侵弹性 签名方案 双线性映射 complete binary tree intrusion-resilient signature scheme bilinear map
  • 相关文献

参考文献9

  • 1[2]Desmedt Y,Frankel Y.Threshold cryptosystems[C]// Proc of crypto'89,LNCS 435.Berlin:Springer-Verlag,1990:307-315.
  • 2[3]Bellare M,Miner S.A forward-secure digital signature scheme[C]// Proc of crypto'99,LNCS 1666.Berlin:Springer-Verlag,1999:19-21.
  • 3[4]Dodis Y,Katz J,Xu S,et al.Strong dey-insulated signature schemes[C]//Proc of PKC 2003,LNCS 2567.Berlin:Springer-Verlag,2003:20-21.
  • 4[5]Dae H Y,Pil J L.Efficient key updating signature schemes based on IBS*[C]//Proc of Cryptography and Coding 2003,LNCS 2898.Berlin:Springer-Verlag,2003:179-181.
  • 5[6]Itkis G,Reyzin L.SiBIR:Signer-base intrusion-resilient signatures[C]//Proc of Crypto'2002,LNCS 2442.Berlin:Springe-Verlag,2002:19-22.
  • 6[7]Canetti R,Halevi S,Katz J.A Forward-secure public-key encryption scheme[C]//Proc of Eurocrypt'03,LNCS 2656.Berlin:Springer-Verlag,2003:255-271.
  • 7[8]Dodis Y,Franklin M,Katz J,et al.Intrusionresilient public key encryption[C]//Proc of CT-RSA'03,LNCS 2612.Berlin:Springer-Verlag,2003:19-31.
  • 8[9]Dodis Y,Franklin M,Katz J,et al.A generic construction for intrusion-resilient public key encryption[C]// Proc of CT-RSA'04,LNCS 2964.Berlin:Springer-Verlag,2004:81-98.
  • 9[10]Boneh D,Franklin M.Identity-based encryption from the weil pairing[C]//Proc of crypto'01,LNCS 2139.Berlin:Springer-Verlag,2001:219-221.

同被引文献5

  • 1Jia Yu,Rong Hao,Fanyu Kong,et al.Forward-Secure I-dentity-Based Signature:Security Notions and Construc-tion. Information Sciences.Elsevier Press . 2011
  • 2Jia Yu,Fanyu Kong,Xiangguo Cheng,et al.Forward-Secure Identity-Based Public-Key Encryption without Ran-dom Oracles. Fundamenta Informaticae . 2011
  • 3Jia Yu,Rong Hao,Fanyu Kong,Yangkui Chenet al.Cryptanalysis of a Type of Forward Secure Signatures andMulti-signatures. International Journal of Computersand Applications . 2010
  • 4于佳,孔凡玉,程相国,郝蓉,GUO Xiangfa.可证安全的入侵容忍签名方案[J].软件学报,2010,21(9):2352-2366. 被引量:8
  • 5于佳,郝蓉,孔凡玉,程相国,GUO Xiang-Fa.标准模型下的前向安全多重签名:安全性模型和构造[J].软件学报,2010,21(11):2920-2932. 被引量:13

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部