期刊文献+

多授权中心的基于属性的签名 被引量:8

Multi-authority Attribute-based Signature
下载PDF
导出
摘要 现实生活中,用户的多个属性由一个授权中心管理,这势必会增大其工作负担,降低效率。为此,设计将用户的多个属性由不同的授权中心分别管理,额外需要一个可信的中心授权方来管理和约束各个授权中心,并构造一种新的签名方案。使用归约安全证明的研究方法证明所提出的方案的安全性归约为离散对数难题和计算Diffie-Hellman难题,并拥有保护用户的私密信息和较高的签名效率的优势。 In real life,many attributes of a user were monitored by a single authority,which would inevitably increase its workload and reduce its efficiency.In order to overcome this problem,a scheme whose attributes were managed by different authorities respectively was designed.At the same time,an additional credible central authority was introduced to manage and constraint these authorities and then a new multi-authority signature scheme was proposed.By using the methodology of reductionist security argument,the security of the scheme was proved equal to discrete logarithm problem and computational Diffie-Hellman problem.This scheme has some advantages,such as protecting the private information of a user,and a higher efficiency in signature.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2011年第1期83-86,共4页 Journal of Sichuan University (Engineering Science Edition)
基金 国家"863"计划资助项目(2007AA01Z472) 高等学校创新引智计划资助项目(B08038) 国家自然科学基金资助项目(60773002)
关键词 多授权中心 基于属性 CDH难题 合谋攻击 multi-authority attribute-based CDH problem collusion attack
  • 相关文献

参考文献11

  • 1Sahai A, Waters B. Fuzzy identity-based encryption [ C ]// Advances in Cryptology-EUROCRYPT 2005. LNCS 3494, Aarhus : Springer-Verlag Press,2005:457 - 473.
  • 2Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [ C ]//Proceedings of the 28^th IEEE Symposium on Security and Privacy. Oakland,2007:321 - 334.
  • 3Cheung L, Newport C. Provably secure ciphertext policy ABE [ C ]//ACM Conference on Computer and Communications Security (ACMCCS). 2007.
  • 4Pirretti M, Traynor P, McDaniel P, et al. based systems [ C ]//13^th ACM Conference Secure atrributeon Computer and Communications Security (ACM CCS). Alexandria Virginia, USA, 2006 : 99 - 112.
  • 5Ostrovsky R, Sahai A, Waters B. Attribute based encryption with non-monotonic access structures [ C ]//ACM Conference on Computer and Communicardons Security (ACM CCS). 2007.
  • 6Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [ C ]// Proc of CCS. New York : ACM Press, 2006 : 89 - 98.
  • 7Yang P, Cao Z, Dong X. Fuzzy identity based signature[ R] Cryptology ePrint Archive, Report 2008/002, http ://eprint iaer. org/2008/002,2007.
  • 8Guo S, Zeng Y. Attribute-based signature scheme [ C ]//International Conference Information Security and Assurance ( ISA 2008 ). 2008:509 - 511.
  • 9Shahandashti S F, Safavi-Naini R. Threshold attribute-based signatures and their application to anonymous credential systems [ C ]//AFRICACRYPT 2009. LNCS 5580, Berlin: Springer-Verlag,2009 : 198 - 216.
  • 10Chase M. Multi-authority attribute based encryption [ C ]// Vadhan S P. Lecture Notes in Computer Science TCC Springer, 2007:515 - 534.

同被引文献96

  • 1杨晓元,林志强,韩益亮.高效的模糊属性基签密方案[J].通信学报,2013,34(S1):8-13. 被引量:3
  • 2Sahai A, Waters B. Fuzzy identity-based encryption [C]//LNCS3494: Advances in Cryptology-EURO- CRYPT 2005. Aarhus: Springer-Verlag Press, 2005: 457-473.
  • 3Goyal V,Pandey O, Sahai A,et al. Attribute-based en- cryption for fine-grained access control of encrypted data [C]//Proc of CCS. New York: ACM Press, 2006:89-98.
  • 4Guo S, Zeng Y. Attribute-based signature scheme [C]//Int Conf of Information Security and Assur- ance ( ISA 2008). Xi ' an: Xi ' an Electronic Sience Technology University Press, 2008 : 509-511.
  • 5Shahandashti S F,Safavi-Naini R. Threshold attribute- based signatures and their application to anonymous credential systems [C]//AFRICACRPT' 2009. Ber- lin: Springe-Verlag, 2009 : 198-216.
  • 6Maji H, Prabhakaran M, Rosulek M. Attribute-Based Signatures:Achieving Attribute-Privacy and Collusion- Resistance[EB/OL]. [2008-11-15]. http://eprint. ia- cr. org/2008/328.
  • 7Kbader D. Attribute based group signatures[EB/OL]. [2007-05-08]. http ://eprint. iacr. org/2007/159.
  • 8Li J, Kim K. Attribute-based ring signatures [EB/ OL]. [2008-07-12]. http://eprint.iacr. org/2008/ 394.
  • 9Yang P,Cao Z,Dong X. Fuzzy identity based signature [EB/OL]. [2008-09-07]. http://eprint. iacr. org/ 2008/002.
  • 10Chase M. Multi-authority attribute based encryption [C]//LNCS 4392 :Lecture Notes in Computer Science TCC. Berlin : Springer, 2007: 515-534.

引证文献8

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部