期刊文献+

可证明安全的基于属性的多授权中心签名方案

A Provable Secure Attribute-Based Signature Scheme with Multi-Authority
原文传递
导出
摘要 基于属性的密码体制中用户的多个属性由一个授权中心管理,这将会增大其工作负担,降低工作效率.本文设计了一个可证明安全的多授权中心的签名方案,将用户的多个属性由不同的授权中心分别管理,属性参数在全域范围选择.采用归约安全证明的研究方法证明此方案的安全性归约为计算Diffie-Hellman难题,方案具有存在性不可伪造和抗合谋攻击的特性. In attribute-based cryptosystem,many attributes of a user were monitored by a single authority,which would inevitably increase its workload and reduce its efficiency.The firstly proposed multi-authority signature scheme was that many attributes were monitored by many different authorities respectively and its attributes were picked from the large universe.By using the methodology of reduction security argument,the security of this scheme was proved equal to the computational Diffie-Hellman problem.Two characteristics of the scheme are the existential unforgeability and the prevention of collusion attacks.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2011年第5期439-443,共5页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(61072140) 高等学校创新引智计划项目(B08038)
关键词 多授权中心 基于属性 中心授权 CDH难题 合谋攻击 multi-authority attribute-based central authority computational Diffie-Hellman problem collusion attack
  • 相关文献

参考文献11

  • 1Sahai A, Waters B. Fuzzy identity-based encryption [C]//LNCS3494: Advances in Cryptology-EURO- CRYPT 2005. Aarhus: Springer-Verlag Press, 2005: 457-473.
  • 2Goyal V,Pandey O, Sahai A,et al. Attribute-based en- cryption for fine-grained access control of encrypted data [C]//Proc of CCS. New York: ACM Press, 2006:89-98.
  • 3Guo S, Zeng Y. Attribute-based signature scheme [C]//Int Conf of Information Security and Assur- ance ( ISA 2008). Xi ' an: Xi ' an Electronic Sience Technology University Press, 2008 : 509-511.
  • 4Shahandashti S F,Safavi-Naini R. Threshold attribute- based signatures and their application to anonymous credential systems [C]//AFRICACRPT' 2009. Ber- lin: Springe-Verlag, 2009 : 198-216.
  • 5Maji H, Prabhakaran M, Rosulek M. Attribute-Based Signatures:Achieving Attribute-Privacy and Collusion- Resistance[EB/OL]. [2008-11-15]. http://eprint. ia- cr. org/2008/328.
  • 6Kbader D. Attribute based group signatures[EB/OL]. [2007-05-08]. http ://eprint. iacr. org/2007/159.
  • 7Li J, Kim K. Attribute-based ring signatures [EB/ OL]. [2008-07-12]. http://eprint.iacr. org/2008/ 394.
  • 8Yang P,Cao Z,Dong X. Fuzzy identity based signature [EB/OL]. [2008-09-07]. http://eprint. iacr. org/ 2008/002.
  • 9Chase M. Multi-authority attribute based encryption [C]//LNCS 4392 :Lecture Notes in Computer Science TCC. Berlin : Springer, 2007: 515-534.
  • 10孙昌霞,马文平,陈和风.多授权中心的基于属性的签名[J].四川大学学报(工程科学版),2011,43(1):83-86. 被引量:8

二级参考文献11

  • 1Sahai A, Waters B. Fuzzy identity-based encryption [ C ]// Advances in Cryptology-EUROCRYPT 2005. LNCS 3494, Aarhus : Springer-Verlag Press,2005:457 - 473.
  • 2Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [ C ]//Proceedings of the 28^th IEEE Symposium on Security and Privacy. Oakland,2007:321 - 334.
  • 3Cheung L, Newport C. Provably secure ciphertext policy ABE [ C ]//ACM Conference on Computer and Communications Security (ACMCCS). 2007.
  • 4Pirretti M, Traynor P, McDaniel P, et al. based systems [ C ]//13^th ACM Conference Secure atrributeon Computer and Communications Security (ACM CCS). Alexandria Virginia, USA, 2006 : 99 - 112.
  • 5Ostrovsky R, Sahai A, Waters B. Attribute based encryption with non-monotonic access structures [ C ]//ACM Conference on Computer and Communicardons Security (ACM CCS). 2007.
  • 6Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [ C ]// Proc of CCS. New York : ACM Press, 2006 : 89 - 98.
  • 7Yang P, Cao Z, Dong X. Fuzzy identity based signature[ R] Cryptology ePrint Archive, Report 2008/002, http ://eprint iaer. org/2008/002,2007.
  • 8Guo S, Zeng Y. Attribute-based signature scheme [ C ]//International Conference Information Security and Assurance ( ISA 2008 ). 2008:509 - 511.
  • 9Shahandashti S F, Safavi-Naini R. Threshold attribute-based signatures and their application to anonymous credential systems [ C ]//AFRICACRYPT 2009. LNCS 5580, Berlin: Springer-Verlag,2009 : 198 - 216.
  • 10Chase M. Multi-authority attribute based encryption [ C ]// Vadhan S P. Lecture Notes in Computer Science TCC Springer, 2007:515 - 534.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部