期刊文献+

分布式协同设计内容摘录签名方案 被引量:3

Content extraction signature scheme for distributed collaborative design
下载PDF
导出
摘要 为了保证分布式协同设计系统中信息交换的基本安全需求,基于椭圆曲线Gap-Diffie-Hellman问题,提出了一个分布式协同设计内容摘录方案。该方案可以从设计者签名认证过的设计文档中摘录出指定部分,并可被任何第三方验证摘录的部分是由原始设计者签名认证过的,同时隐藏文档中没有被摘录的部分。该功能可以满足一种新的安全需求,即在不出示完整文档的情况下认证文档中的部分内容,解决协同信息的共享性、协同性、开放性与机密性、真实性、完整性和不可否认性等安全要求之间的矛盾。 To satisfy essential security requirement for information exchange in distributed collaborative design system, a content extraction signature scheme for distributed collaborative design was proposed based on Gap-Diffie- Hellman problem from Elliptic curves. This new scheme allowed the owner of a document which was signed by the designer to produce an "extracted signature" on certain selected portions of the original document. Any third party could verify the validity of the "extracted signature', while the un-extracted portions of the original document were hidden. This new function could be used to satisfy especial security requirement, in which, the certain selected portions of the original document could be verified but the owner of the signed document need not pass on the whole document to verifying party. Also, it could be used to solve the contradictions among information sharing, collaboration, publicity and message confidentiality, integrity, and non-repudiation in distributed collaborative design system.
出处 《计算机集成制造系统》 EI CSCD 北大核心 2007年第9期1710-1715,共6页 Computer Integrated Manufacturing Systems
基金 国家自然科学基金资助项目(60273089) 陕西省自然科学基础研究计划资助项目(2005F02) 西安理工大学科技创新基金资助项目(108210402)~~
关键词 协同设计 认证 数字签名 内容摘录签名 collaborative design authentication digital signature content extraction signature
  • 相关文献

参考文献12

  • 1高曙明,何发智.分布式协同设计技术综述[J].计算机辅助设计与图形学学报,2004,16(2):149-157. 被引量:101
  • 2孙林夫.面向网络化制造的协同设计技术[J].计算机集成制造系统,2005,11(1):1-6. 被引量:47
  • 3STEINFELD R, BULL L, ZHENG Y. Content extraction signatures[C]//Proceedings of ICICS 2001. Berlin, Germany:Springer-Verlag, 2002:285-304.
  • 4BULL L, STANSKI P, MCG D S. Content extraction signatures using XML digital signatures and custom transforms ondemand[C]//Procedings of the 12th International World Wide Web Conference. New York, N. Y., USA: ACM Press, 2003 : 170-177.
  • 5BULL L, MCG D S, NEWMARCH J, et al. Grouping verifiable content for selective disclosure using XML signatures [C]//Proceedings of ACISP 2003. Berlin, Germany: Springer-Verlag, 2003 : 1-12.
  • 6KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation,1987,48(177) : 203-209.
  • 7BONEH D, GENTRY C, LYNN B,et al. Aggregate and verlfiably encrypted signatures from bilinear maps[C]//Proceedings of Eurocrypt 2003, Lecture Notes in Computer Science 2656. Berlin, Germany: Springer-Verlag, 2003 : 416-432.
  • 8BONEH D, SHACHAM H, LYNN B, et al. Short signatures from the Well pairing[C]//Proceedings of Asiacrypt'01. Berlin, Germany: Springer-Verlag, 2001:514-532.
  • 9黄保青.椭圆曲线密码体制[EB/OL].(2004-05-06)[2006-06-26].http://www.hids.com.cn/data.asp.
  • 10BELLARE M. GOLDREIC O,GOLDWASSER S, et al. Incremental cryptography:the case of hashing and signing[C]// Proceedings of CRYPTO'94. Berlin, Germany:Springer-Verlag,1994: 216-233.

二级参考文献63

  • 1林宗楷.协同设计将对设计工作和CAD技术引起的变化[J].软件学报,1998,9:126-131.
  • 2REGLI W. Internet-enabled computer-aided design[J].IEEE Internet Computing, 1997,1(1):39-51.
  • 3MAHER M L, RUTHERFORD J H. A model for synchronous collaborative design using CAD and database management[J]. Rrsearch in Engineering Design, 1997,9 (7) : 95 -98.
  • 4SUN Linfu. The development of knowledge-based Intelligent CAD system[A]. Proceedings of 4th International Conference on Computer- Aided Industrial Design Conceptual Design[C].Jinan: International Academic Publishers World Publishing Corporation, 2001. 383-388.
  • 5Regli W. Internet-enabled computer-aided design[J]. IEEE Internet Computing, 1997, 1(1): 39~51
  • 6Urban S D, Dietrich S W, Saxena A, et al. Interconnection of distributed components: An overview of current middleware solutions[J]. Journal of Computer and Information Sciences and Engineering, 2001, 1(1): 23~31
  • 7Pahng F, Senin N, Wallace D R. Distributed modeling and evaluation of product design problems[J]. Computer-Aided Design, 1998, 30(5): 411~423
  • 8周勋 李洁 何发智.基于Internet的协同实体建模系统的设计与实现[A]..见:第12届全国计算机辅助设计与图形学学术会议论文集[C].贵阳,2002.720-725.
  • 9Cutkosky M R, Engelmore R S, Fikes R, et al. PACT: An experiment in integrating concurrent engineering systems[J]. IEEE Computer, 1993, 26(1): 28~37
  • 10Frost H R, Cutkosky M R. Design for manufacturability via agent interaction[A]. In: Proceedings of 1996 ASME Design Engineering Technical Conferences[CD], Irvine, California, 1996. ASME DETC96/DFM-1302

共引文献144

同被引文献19

  • 1Andrew S.Tanenbaum.计算机网络[M].第4版,清华大学出版社,2004.
  • 2王斌.WebServices安全问题的研究[J].华北电力大学,2005.
  • 3FREDRICK C, GIANPAOLO C. Architecture strategies for catching the long tail [ EB/OL]. ( 2006-04 ) [ 2012438-30 ]. ht- tp ://msdn. microsoft, com/en-us/library/aa479069, aspx.
  • 4STEFAN A, TORSTEN G, DEAN J, et al. Multi-tenant databases for software as a service: schema-mapping technique [ C ]//Proceedings of SIGMOD' 08. New York: ACM Press, 2008 : 1195-1206.
  • 5BENANTAR M. The internet public key infrastructure [ J ]. IBM Systems Journal, 2001, 40 ( 3 ) :648-665.
  • 6LAURENCE B, DAVIDMCG S, ZHENG Yuliang. A hierarchical extraction policy for content extraction signatures[ J ].In- ternational Journal on Digital Libraries, 2004, 4 (3) :208-222.
  • 7RON S, LAURENCE B, ZHENG Yuliang. Content extraction signatures [ C ]//Proceedings of ICICS 2001. Berlin:Springer- Verlag, 2001:285-304.
  • 8William Stallings. Cryptography and Network security principles and practices [ M ].孟庆树,王丽娜,傅建明,等译.4版.北京:电子工业出版社,2009:225.
  • 9DAN B, MATT F. Identity-based encryption from the weil pairing[ J ]. SIAM J of Computing, 2003, 32 (3) :586-615.
  • 10ALFREDJ M, PAULCVAN O, SCOTTA V. Handbook of applied cryptography [ M].胡磊,王鹏,译.北京:电子工业出版社,2005:133.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部