期刊文献+

并行密钥隔离聚合签名 被引量:4

Parallel Key-Insulated Aggregate Signature
下载PDF
导出
摘要 为了应对聚合签名中的密钥泄露问题,将并行密钥隔离机制扩展到聚合签名系统中,给出了并行密钥隔离聚合签名的概念.在给出的形式化定义和安全模型的基础上,提出了第一个并行密钥隔离聚合签名方案,并在随机预言模型下证明了方案的安全性.所提出的方案满足密钥隔离性、强密钥隔离性和安全密钥更新等性质,特别在签名验证方面具有较高的效率.引入的两个协助器交替帮助用户进行临时私钥更新,增强了系统防御密钥泄露的能力. To deal with the key exposure problem in aggregate signature, this paper extends the parallel key-insulated mecha- nism to aggregate signatures and introduces the primitive of parallel key-insulated aggregate signature. On the basis of formalized definitions and security notions, we propose the first parallel key-insulated aggregate signature scheme and demonstrate that the pro- posed scheme is provably secure in the random oracle model. The proposed scheme satisfies key-insulated security, strong key-insu- lated security and secure key-updates. Especially our scheme is high-efficiency in verifications. Two introduced helpers can a/temately help users to update the private keys, which s-engthen the system's ability to resist the key compromise.
出处 《电子学报》 EI CAS CSCD 北大核心 2015年第5期1035-1040,共6页 Acta Electronica Sinica
基金 国家自然科学基金(No.61272425 No.61202475 No.61402245) 青岛市科技计划(No.12-1-4-2(16)-jch No.13-1-4-151-jch) 山东省计算机网络重点实验室开放课题(No.SDKLCN-2013-03) 华为科技基金(No.YB2013120027)
关键词 密钥隔离 并行性 聚合签名 随机预言模型 key-insulation parallelism aggregate signature random oracle model
  • 相关文献

参考文献16

  • 1Bellare M,Miner S.A forward-secure digital signature scheme.Proceedings of the CRYPTO 1999[C].1999.431-448.
  • 2Yu J,Kong F Y,Cheng X G,et al.One forward-secure signature scheme using bilinear maps and its applications[J].Information Sciences,2014,279:60-76.
  • 3Yu J,Hao R,Kong F Y,Cheng X G,et al.Forward-secure identity-based signature:security notions and construction[J].Information Sciences,2011,181(3):648-660.
  • 4Dodis Y,Katz J,Xu S,et al.Strong key-insulated signature schemes.Proceedings of the 6th Int Workshop on Practice and Theory in Public Key Cryptography[C].Berlin:Springer,2003,130-144.
  • 5葛立荣,于佳,程相国,郝蓉,赵慧艳,李朦.标准模型下支持多协助器的强密钥隔离签名方案[J].计算机研究与发展,2014,51(5):1081-1088. 被引量:2
  • 6Yu J,Kong F Y,Cheng X G,Hao R,et al.Intrusion-resilient identity-based signature:security definition and construction[J].Journal of Systems and Software,2012,85(2):382-391.
  • 7Hanaoka G,Hanaoka Y,Imai H.Parallel key-insulated public key encryption.Proceedings of Public Key Cryptography-PKC 2006[C].Berlin:Springer,2006.105-122.
  • 8翁健,陈克非,李祥学,刘胜利,邱卫东.Parallel Key-insulated Signature: Framework and Construction[J].Journal of Shanghai Jiaotong university(Science),2008,13(1):6-11. 被引量:2
  • 9万中美,来学嘉,翁健,刘胜利,龙宇,洪璇.Strong Key-Insulated Signature in the Standard Model[J].Journal of Shanghai Jiaotong university(Science),2010,15(6):657-661. 被引量:2
  • 10Chen Jianhong,Chen Kefei,Long Yu.Identity-based threshold key-insulated signature[J].High Technology Letters,2012,18(3):275-280. 被引量:3

二级参考文献53

  • 1李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 2WENG J, LIU S L, CHEN K F, et al. Identity-based key-insulated signature without random oracles [C]// Proceedings of International Conference on Computational Intelligence and Security. Berlin: Springer- Verlag, 2007: 470-480.
  • 3WENG J, CHEN K F, LIU S L, et al. Identity- based key-insulated signature with secure key-updates [C]//Proceedings of the 6th China International Conference on Information Security and Cryptology. Berlin: Springer-Verlag, 2006: 13-26.
  • 4DODIS Y, KATZ J, Xu S, et al. Key-insulated publickey cryptosystems [C]// Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology- Eurocrypt'2002. Berlin: Springer-Verlag, 2002: 65-82.
  • 5BELLARE M, PALACIO A. Protecting against key exposure: strongly key-insulated encryption with optimal threshold [J]. Applicable Algebra in Engineering, Communication and Computing, 2006, 16(6): 379-396.
  • 6HANAOKA Y, HANAOKA G, SHIKATA J, et al. Unconditionally secure key-insulated cryptosystems: Models, bounds and constructions [C]// Proceedings of the 4th International Conference on Information and Communications Security. Berlin: Springer-Verlag, 2002: 85- 96.
  • 7DODIS Y, YUNG M. Exposure-resilience for free: The hierarchical ID-based encryption case [C]// Proceedings of the First International IEEE Security in Storage Workshop. Washington, DC, USA: IEEE, 2002: 45-52.
  • 8HANAOKA G, HANAOKA Y, IMAI H. Parallel keyinsulated public key encryption [C]// Proceedings of the 9th International Conference on Practice and Theory in Public Key Cryptograph: Public Key Cryptography. Berlin: Springer-Verlag, 2006: 105-122.
  • 9DODIS Y, KATZ J, XU S, et al. Strong key-insulated signature schemes [C]// Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography:Public Key Cryptography. Berlin: Springer-Verlag, 2003: 130-144.
  • 10LE Z, OUYANG Y, FORD J, et al. A Hierarchical key- insulated signature scheme in the CA trust model [C]//Proceedings of 7th International Conference on Information Security. Berlin: Springer-Verlag, 2004: 280-291.

共引文献41

同被引文献18

引证文献4

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部