期刊文献+

有界恢复模型下弹性泄露签名的新构造 被引量:2

New Constrcution of Leakage-resilient Signature in Bounded Retriveal Model
下载PDF
导出
摘要 弹性泄露密码学是当前密码学研究的热点.给出一个弹性泄露签名的定义,该定义是标准签名定义的一个扩展.构造一个有界恢复模型下的弹性泄露签名方案,并在标准模型下证明了它的安全性.本文的方案基于双线性配对的弹性泄露签名,结合了一次签名和Waters签名的特,通过改进,长度可大大缩短,克服了一次签名签名长度过长的缺点,具有较好的实用价值. Leakage-resilient cryptography is very hot in the research of cryptography. We gvie a formal definition of leakage-resilient signature, which is a extension to the standard definition of signature. We construction a new leakage-resilient signature scheme in bounded retrvieal model, and prove its security based on the standard model. Our scheme is the first leakage-resilient signature from bilinear pairings, which is combined with the characteristics of one-time signature and Waters signature. The scheme also can be im- proved in signature size, which overcomes the shortcoming of large signature size in one-time signature. Hence, it demonstrates a better applicability.
作者 王志伟 张伟
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第2期380-382,共3页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60703086)资助 中国博士后科学基金面上项目(20090451241)资助 南京邮电大学引进人才科研启动基金项目(NY209014)资助
关键词 弹性泄露签名 有界恢复模型 标准模型 Waters签名 一次签名 leakage-resilient signature bounded retriveal model standard model Waters signature one-time signature
  • 相关文献

参考文献11

  • 1Biham E, Shamir A. Di_erential fault analysis of secret key crypto- system[ A]. Advance in Cryptology-Crypto'97. Leture Notes in Computer Science [ C ]. Berlin: Springer-Verlag, 1997,1294: 513 - 525.
  • 2Quisquatcr J J, Samydc D. Elecuromagnedc analysis (cma) : meas- ures and counter-measures for smart cards[A]. E-smaare 2001, Leturc Noms in Computer Science [ C ]. Berlin: Springcr-Vcrlag, 2001, 2140:200-210.
  • 3Gandol K,Mourtcl C, Oliver F. Electromagnetic analysis (cma) : concrete rvsults[ A]. Chcs 2001 ,Leturc Notes in Computer Science [C]. Berlin: Springcr-Vcrlag,2001,2162:251-261.
  • 4Halderman J, Schoen S D, Heninger N, et al. Lest we remember [ A] : Cold boots attacks on encryption keys[ C ]. Unenix Security Symposium 2008:45 -60.
  • 5Alwen J, Dodis Y, Wichs D. Leakage-resilient public key cryptog- raphy in bounded retrieval model [ A ]. Advance in Cryptology- Crypto'09. Leture Notes in Computer Science [C]. Berlin: Springer-Verlag ,2009, 5677:36-54.
  • 6Stefan D, Krzysztof P. Samyde. Infusion-resilient secret sharing [M]. Focs 2008, ACM Press, 2008.
  • 7Naor M,Segev G. Public key cryptosystems resilient to key leakage [ A]. Advance in Cryptology-Crypto'09. Leture Notes in Comput- er Science[ C ]. Berlin: Springer-Verlag,2009, 5677 : 18-35.
  • 8Katz J, Vaikuntanathan V. Signature scheme with bounded leakage resilience[ A]. ASIACRPT'09. Leture Notes in Computer Seience [ C]. Berlin: Spdnger-Vettag,2009, 5912:703-720.
  • 9Lamport L. Consructing digital signatures from a one-way function [ R]. Technical Report SRI-CSL-98, SRI International Computer Science Laboratory, October, 1979.
  • 10Waters B. Efficient identity-based encryption without random ora- cles[A]. Cramer, R. (ed.) EUROCRYPT 2005[C]. LNCS, Springer, Heidelberg,2005:3494:320-329.

同被引文献53

  • 1SADEGHI A R, NACCACHE D. Towards Hardware-intrinsicSecurity[M]. Heidelberg: Springer, 2010: 99-134.
  • 2DZIEMBOWSKI S , FAUST S.Leakage-resilient Cryptography fromthe Inner-product Extractor[A]. ASIACRYPT 2011 [M]. Heidelberg:Springer, 2011: 702-721.
  • 3SHIN S H, KOBARAK K. Secure Password Authentication Schemesand Their Applications[J].Synthesiology, 2014, 7(3) : 179-189.
  • 4SHIN S H, KOBARA K, LMAI H.Efficient and Leakage-ResilientAuthenticated Key Transport Protocol Based on RSA[C]//ACNS2005.3rd International Conference, June 7-10,2005,New York, NY,USA.Heidelberg: Springer, 2005: 269-284.
  • 5SHIN S H,KOBARA K, LMAI H.An Efficient and Leakage-resilient RSA-Based Authenticated Key Exchange Protocol withTight Security Reduction[J]. IEICE Transactions on Fundamentals ofElectronics, 2007, E90(2): 474-490.
  • 6FUJIOKA A, SUZUKI K, USTAOGLU B.Ephemeral Key LeakageResilient and Efficient ID-AKEs that Can Share Identities, Private andMaster Keys[C]//Pairing 2010.Pairing-Based Cryptography - Pairing2010 4th International Conference, December 13-15,2010, YamanakaHot Spring, Japan.Heidelberg: Springer, 2010: 187-205.
  • 7CHEN L,KUDLA C.Identity Based Authenticated Key AgreementProtocols from Pairings [J]. International Journal of Information Security,2003,6(4):213-241.
  • 8FUJIOKA A, SUZUKI K.SufHcient Condition for Identity-BasedAuthenticated Key Exchange Resilient to Leakage of Secret Keys [C]//ICISC 2011.14th Annual International Conference on InformationSecurity and Cryptology, November 30 - December 2,2011,Seoul,Korea.Heidelberg: Springer, 2012: 490-509.
  • 9NAOR M. SEGEV G. Public-key Cryptosystems Resilient to KeyLeakage[C]//CRYPTO 2009.29th Annual International CryptologyConference, August 16-20, 2009, Santa Barbara, CA, USA.Heidelberg:Springer, 2009: 18-35.
  • 10ALWENJ, DODISY,WICHS D.Leakage-Resilient Public-KeyCryptography in the Bounded-retrieval Model[C]//CRYPTO 2009.29thAnnual International Cryptology Conference, August 16-20,2009,Santa Barbara, CA, USA.Heidelberg: Springer, 2009: 36-54.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部