期刊文献+

树结构在几种特殊签名中的应用研究 被引量:1

Applications of Trees in Special Signatures
下载PDF
导出
摘要 树结构的层次性和链式的存储方式使其在数据查找的实现中体现出很高的效率,在数据插入和删除等操作的实现中无需移动大量节点,因而不仅在计算机科学领域具有广泛的应用,在实现特殊的信息安全方面也具有独特的作用。文章研究如何将树结构应用于仅增签名、前向安全签名、递增签名、可修订签名、内容抽取签名等特殊签名方案的问题,比较分析基于树结构的方案与普通方案在功能和效率上的差异。 The tree structure,with the properties of hiberarchy and chain-style storage,is well suited to such applications as information search and data inserting/deleting without moving too many nodes. It has found many applications in computer science,as well as in meeting special security requirements of information security.We investigate the ways to exploit the tree structures in special signatures such as Append-Only Signatures,Forward-Secure Signatures,Incremental Signatures,Redactable Signatures,Content Extract Signatures,with the purpose to gain special functionalities and better performance,compared with those traditional trivial realizations.
作者 韦宝典
出处 《计算机工程与应用》 CSCD 北大核心 2006年第11期16-20,182,共6页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:60403007) 广东省自然科学基金资助项目(编号:05300706) 中山大学信息科学与技术学院青年教师科研启动基金资助项目(编号:350405)
关键词 树结构 增签名 向安全签名 增签名 修订签名 容抽取签名 tree structures,Append-Only Signatures, Forward-Secu re Signatures, Incremental Signatures, Redactable Signatures, Content Extract Signatures
  • 相关文献

参考文献10

  • 1Eike Kiltz,Anton Mityagin,Saurabh Panjwani et al.Append-Only Signatures[C].In:Proceedings of the 32nd International Colloquium on Automata,Languages and Programming ICALP,Volume 3580 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Germany,2002:435~445
  • 2Mihir Bellare,Sara K Miner.A Forward-Secure Digital Signature Scheme[C].In:Cryptology-Crypto'99,Volume 1666 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Germany,1999:431~448
  • 3Y Dodis,J Katz,S Xu et al.Key-Insulated Public Key Cryptosystems[C].In:Cryptology-EUROCRYPT 2002,Volume 2332 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Germany,2002:65~82
  • 4Y Dodis,J Katz,S Xu et al.Strong Key-Insulated Signature Schemes[C].In:Public Key Cryptography-PKC 2003,Volume 2567 of Lecture Notes of ComPuter Science,Springer-Verlag,Berlin,Germany,2003:130~144
  • 5Nicolas González-Deleito,Olivier Markowitch,Emmanuel Dall'Olio.A New Key-Insulated Signature Scheme[C].In:Information and Communications Security(ICICS 2004),Volume 3269 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Germany,2004:465 ~479
  • 6Mihir Bellare,Oded Goldreieh,Shafi Goldwasser.Incremental Cryptography:The Case of Hashing and Signing[C].In:Y G Desmedt ed.Advances in Cryptology-Crypto'94,Volume 839 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Germany,1994:216~233
  • 7Mihir Bellare,Oded Goldreich,Shafi Goldwasser.Incremental Cryptography and Application to Virus Protection[C].In:Proceedings of the 27^th Annual ACM Symposium on the Theory of Computing,1995:45~56
  • 8Robert Johnson,David Molnar,Dawn Song et al.Homomorphic Signature Schemes[C].In:Proceedings of CT-RSA 2002,Volume 2271 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Heidelberg,2002:2441~262
  • 9Ron Steinfeld,Laurence Bull,Yuliang Zheng.Content Extraction Signatures[C].In:Proceedings of ICICS 2001,Volume 2288 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Heidelberg,2002:2851~304
  • 10S Halevi,S Micali.Practical and Provable-Secure Commitment Schemes from Collision-Free Hashing[C].In:Proceedings of Advances in Cryptology-Crypto'96,Volume 1109 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Germany,1996:201 ~215

同被引文献1

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部