期刊文献+

无完全可信PKG身份签名的分层CES方案

Scheme of hierarchical content extraction signature based on non-credible PKG identity-based signature
原文传递
导出
摘要 针对管理型SaaS应用整体签批分层处理业务中隐私保护的需求,提出了一种无完全可信私钥生成中心(private key generator,PKG)身份签名的分层内容摘录签名(content extraction signature,CES)方案。采用分层摘录策略控制分片和签名摘录,基于身份签名克服了公钥基础设施证书管理复杂的问题,由租户和服务提供商的PKG独立生成用户私钥分量,在一定程度上克服了无完全可信PKG问题。分析表明,该方案具有用户私钥的私密性、CES的隐私性和不可伪造性,可推广应用于在线办公、在线图书销售等方面。 To meet the requirement of privacy protection in doing hierarchical business after signing the whole one in management-type software as a service application, a scheme of hierarchical content extraction signature was proposed based on the identity-based signature of non-credible private key generator. The extraction of both fragment and signature was in control by the hierarchical extraction policy. The complexity of certificate in public key infrastructure was avoided based on the identity-based signature. In some extent, the non-credible private key generator problem was weakened whose part independently generated by service provider and tenant. The analyzing results show that the scheme has the specialties of user' s private key' s privacy, un-forge and privacy of CES. It can be applied to online office and book sale. Key words: software as a service application; content extraction signature; hierarchical extraction; identity-based signature; privacy protection
作者 景旭 何东健
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2012年第9期7-14,18,共9页 Journal of Shandong University(Natural Science)
基金 "十二五"国家科技支撑计划项目(2011BAD21B05) 中央高校基本科研业务费项目(QN2011036) 杭州市电子商务与信息安全重点实验室资助项目(HZEB201004)
关键词 SAAS应用 内容摘录签名 分层摘录 身份签名 隐私保护 software as a service application content extraction signature hierarchical extraction identity-based signa-ture privacy protection
  • 相关文献

参考文献13

  • 1FREDRICK C, GIANPAOLO C. Architecture strategies for catching the long tail [ EB/OL]. ( 2006-04 ) [ 2012438-30 ]. ht- tp ://msdn. microsoft, com/en-us/library/aa479069, aspx.
  • 2STEFAN A, TORSTEN G, DEAN J, et al. Multi-tenant databases for software as a service: schema-mapping technique [ C ]//Proceedings of SIGMOD' 08. New York: ACM Press, 2008 : 1195-1206.
  • 3BENANTAR M. The internet public key infrastructure [ J ]. IBM Systems Journal, 2001, 40 ( 3 ) :648-665.
  • 4LAURENCE B, DAVIDMCG S, ZHENG Yuliang. A hierarchical extraction policy for content extraction signatures[ J ].In- ternational Journal on Digital Libraries, 2004, 4 (3) :208-222.
  • 5RON S, LAURENCE B, ZHENG Yuliang. Content extraction signatures [ C ]//Proceedings of ICICS 2001. Berlin:Springer- Verlag, 2001:285-304.
  • 6梁成全,宋余庆,耿飙,陈健美,严振.基于ECC的病历文档内容抽取签名方案的研究[J].计算机应用研究,2010,27(7):2650-2653. 被引量:4
  • 7王晓峰,张璟,王尚平,王秋萍,张翔.分布式协同设计内容摘录签名方案[J].计算机集成制造系统,2007,13(9):1710-1715. 被引量:3
  • 8蓝才会,王彩芬.基于身份的可截取签名方案[J].计算机应用,2007,27(10):2456-2458. 被引量:7
  • 9张学军.新的基于身份的广义指定多验证者签名[J].计算机工程与应用,2008,44(13):33-35. 被引量:2
  • 10William Stallings. Cryptography and Network security principles and practices [ M ].孟庆树,王丽娜,傅建明,等译.4版.北京:电子工业出版社,2009:225.

二级参考文献44

  • 1孙林夫.面向网络化制造的协同设计技术[J].计算机集成制造系统,2005,11(1):1-6. 被引量:47
  • 2刘颖,胡予濮,王飞,卢晓君.一个高效的基于身份的门限签名方案[J].西安电子科技大学学报,2006,33(2):311-315. 被引量:13
  • 3刘军龙,王彩芬.基于身份的可截取门限签名方案[J].计算机应用,2006,26(8):1817-1820. 被引量:7
  • 4Steinfeld R,Bull L,Wang H,et al.Universal designated verifier signatures[C]//Advaneed in Asiaerypt03.Berlin:Springer-Verlag,2003: 523-542.
  • 5Shamir A.Identity-based cryptosystems and signature schemes[C]// LNCS 196:Advances in Cryptology,Crypto'84,Berlin, 1984:47-53.
  • 6Boneh D,Franklin M.Identity-based encryption from the weil pairing[C]//LNCS 2139:Advances in Cryptology,Crypto 2001,2001: 213 -229.
  • 7Boneh D,Lynn B,Shacham HShort signature from the weil pairing[C]// LNCS 2248:Advances in Cryptology,Asiacrypt 2001,2001:514-532.
  • 8Seo S-H,Huang J H,Choi K Y,et al.Identity-based universal designated multi-verifiers signature schemes[J].Computer Standards & Interfaces,2007,9:1-8.
  • 9Yi X.An identity-based signature scheme from the weil pairing[J]. IEEE Communications Letters,2003,7(2):76-78.
  • 10Bellare M,Garay J A,Rabin T.Fast batch verification for modular exponentiation and digital signatures[C]//LNCS 1403:Advances in Cryptology-Eurocrypt ' 98.[S.l.] : Springer-Verlag, 1998 : 236-250.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部