期刊文献+

无安全信道的OSBE方案 被引量:2

Oblivious signature-based envelope without secure channel
下载PDF
导出
摘要 基于访问控制策略的协议无法解决信任协商中出现的循环依赖问题,OSBE(oblivious signature-based en-velope)方案可用来克服循环依赖,然而既有方案需要建立在一个安全信道上才能实施.利用基于身份的系统和基于证书加密的思想,提出一个高效率的不需要安全信道的OSBE方案,并证明了新方案不仅满足有效性、不经意性等OSBE的所有性质,而且也克服了原OSBE方案中接收者外传证书和签名的问题;在随机预言模型下,如果不存在一个多项式时间的算法能以不可忽略的概率伪造对消息的聚合签名,那么方案对接受者是安全的. Exchange of digitally signed certificates was often used to establish mutual trust between strangers that wish to share resources or to conduct business transactions. Automated trust negotiation (ATN) was an approach to regulate the flow of sensitive information during such an exchange. But ATN cannot handle cyclic policy interdependency satisfactorily. Oblivious signature based envelope (OSBE) is a scheme to solve this problem. However, the existed scheme could only be implemented on a secure channel. An efficient OSBE scheme without the secure channel is proposed using the ideas of identity based systems and certificate-based encryption, which satisfies all the properties required by OSBE such as soundness and oblivious et al. Also, the scheme can achieve the desired security notations in the random oracle model.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2006年第4期590-593,共4页 Journal of Zhejiang University:Engineering Science
基金 国家"863"高技术研究发展计划资助项目(2002AA414070) 国家自然科学基金资助项目(60503006)
关键词 自动信任协商协议 OSBE方案 密码体制 ATN protocol OSBE Identity-based systems
  • 相关文献

参考文献10

  • 1SEAMONS K E,WINSLETT M,YU T.Limiting the disclosure of access control policies during automated trust negotiation[C]∥Proceedings of the Symposium on Network and Distributed System Security.San Diego,California,USA:IEEE Computer Society Press,2001:109-124.
  • 2WINSBOROUGH W H,LI N.Towards practical automated trust negotiation[C]∥Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks.Monterey,California,USA:IEEE Computer Society Press,2002:92-103.
  • 3LI N,DU W,BONEH D.Oblivious signature-based envelope[J].Journal of Distributed Computing,2005,17(4):293-302.
  • 4ASOKAN N,Shoup Victor,Waidner Michael.Optimistic fair exchange of digital signatures[J].IEEE Journal on Selected Areas in Communications,2000,18(4):591-610.
  • 5BAO F,DENG R H,MAO W.Efficient and practical fair exchange protocols with off-line TTP[C]∥Proceedings of the 1998 IEEE Symposium on Security and Privacy.Oakland,California,U S A:IEEE Computer Society Press,1998:77-89.
  • 6GIRAUL M.Self-certified public keys[C]∥ Advances in Cryptology-Eurocrypt 1991,LNCS 547.Brighton,UK:Springer-Verlag,1991:490-497.
  • 7SHAMIR A.Identity-based cryptosystems and signature schemes[C]∥Advances in Cryptology-Crypto 1984,LNCS 196.Santa Barbara,California,USA:Springer-Verlag,1984:47-53.
  • 8BONEH D,FRANKIN M.Identity-based encryption from the Weil pairings[C]∥Advances in Cryptology-Crypto 2001,LNCS 2139.Santa Barbara,California,USA:Springer-Verlag,2001:213-229.
  • 9BONEH D,LYNN B,Shacham H.Short signatures from the Weil pairings[C]∥Advances in Cryptology-Asiacrypt 2001,LNCS 2248.Gold Coast,Australia:Springer-Verlag,2001:514-532.
  • 10BONEH D,GENTRY C,LYNN B,et al.Aggregate and verifiably encrypted signatures from the bilinear pairings[C]∥Advances in Cryptology-Eurocrypt 2003,LNCS 2656.Warsaw,Poland:Springer-Verlag,2003:416-432.

同被引文献20

  • 1陈涛,谢阳群.基于扩展的N维魔方加密算法的设计与实现[J].情报杂志,2005,24(2):13-14. 被引量:6
  • 2李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 3廖振松,金海,李赤松,邹德清.自动信任协商及其发展趋势[J].软件学报,2006,17(9):1933-1948. 被引量:52
  • 4LI JIANGTAO, Ll NINGHUI. OACerts: Oblivious attribute certifi-cates[ C ]// Proceedings of the Third Conference on Applied Cryp-tograpby and Network Security. New York: ACM, 2003. 108 121.
  • 5YU T, WINSLETI' M. A unified scheme for resource protection in automated trust negotiation [ C ]// Proceedings of the 2003 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2003:245-257.
  • 6SEAMONS K E, WINSLE3TF M, YU T. Limiting the dis61osure of access control policies during automated trust negotiation[ C ]//Network and Distributed System Security Symposium. California: IEEE Computer Society, 2001:212-231.
  • 7WINSBOROUGH W H, LI N H. Towards practical automated trust negotiation[C ]// Proceedings of the Third International Workshop on Policies for Distributed System and Networks. Washington, DC: IEEE Computer Society, 2002:92 - 103.
  • 8HOLT J E, BRADSHAW R W, SEAMONS K E, et al. Hidden credentials[ C ]//2nd ACM Workshop on Privacy in the Electronic Society. New York: ACM, 2003:1-8.
  • 9BONEH D, FRANKLIN M. Identity based encryption from the Weil pairing, extended abstract[ C ] // Proceedings of Crypto 2001, LNCS 2139. Berlin: Springer-Verlag, 2001:213-229.
  • 10STINSONDR.密码学原理与实践[M].3版.冯登国,译.北京:电子工业出版社,2009.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部