期刊文献+

可修订数字签名研究综述 被引量:5

Survey on Redactable Signatures
下载PDF
导出
摘要 数据的安全问题已成为关系国家经济、政治、国防、文化安全的重大问题.数字签名可验证数据内容的完整性和数据源的真实性,是保障数据安全的核心技术之一.数字签名的传统安全要求为在自适应选择消息攻击下满足存在不可伪造性.虽然数字签名的传统安全目标能满足数据认证的基本要求,但也阻碍了对已签名数据的合理操作,不能满足很多实际应用的需求.可修订签名是一类支持编辑操作的具有同态性质的数字签名.在不与签名人交互的情况下,签名持有人(修订者)可删除已签名数据中的敏感子数据,并计算修订后数据的有效签名.自2001年可修订数字签名被正式提出以来,就一直是应用密码学领域的研究热点.近年来许多国内外的学者从形式化安全定义、修订规则、计算效率、通信效率等多个方面对其进行探索研究,相继取得了一批有意义的研究成果.网络技术及其应用的快速发展在不断地对可修订数字签名提出新的要求,将从其核心算法定义、安全模型以及现有的代表性方案等方面对可修订数字签名进行概括和分析,并探讨值得进一步研究的问题. Data security issues have become a serious challenge to national economic,political,defence and cultural security.As a core technology in protecting data security,digital signatures have been widely used for the verification of data integrity and source authenticity.The security definition of conventional digital signatures is existentially unforgeable against adaptive chosen-message attacks.Although it meets the basic security requirement of data authentication,it hampers the reasonable operation of authenticated data which is desirable in many practical applications.As a type of malleable homomorphic signatures for editing,redactable signatures allow the signature holder(redactor)to delete sensitive portions of the signed data and generate a valid signature for the disclosed data without any help from the original signer.It has been a research hotspot in the field of cryptography since it was introduced in 2001.In recent years,many researchers have studied redactable signatures from the aspects of formal security definition,redaction control mechanism,computational cost and communication overhead,and there are lots of research results.However,the rapid development of network technology and its applications are putting forward new challenges to redactable signatures.This paper summarizes and analyses redactable signatures in terms of algorithm definition,security model and representative designs.Furthermore,some existing problems worthy of further study are also discussed.
出处 《计算机研究与发展》 EI CSCD 北大核心 2017年第10期2144-2152,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61402110 61472083 61771140) 福建师范大学校创新团队基金项目(IRTL1207) 福建省杰出青年科学基金项目(2016J06013)~~
关键词 可修订签名 同态签名 数字签名 数据认证 安全模型 redactable signatures homomorphic signatures digital signature data authentication security model
  • 相关文献

参考文献2

二级参考文献15

  • 1CAO Chunjie,MA Jianfeng,MOON Sangjae.Provable Efficient Certificateless Group Key Exchange Protocol[J].Wuhan University Journal of Natural Sciences,2007,12(1):41-45. 被引量:8
  • 2Eike Kiltz,Anton Mityagin,Saurabh Panjwani et al.Append-Only Signatures[C].In:Proceedings of the 32nd International Colloquium on Automata,Languages and Programming ICALP,Volume 3580 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Germany,2002:435~445
  • 3Mihir Bellare,Sara K Miner.A Forward-Secure Digital Signature Scheme[C].In:Cryptology-Crypto'99,Volume 1666 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Germany,1999:431~448
  • 4Y Dodis,J Katz,S Xu et al.Key-Insulated Public Key Cryptosystems[C].In:Cryptology-EUROCRYPT 2002,Volume 2332 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Germany,2002:65~82
  • 5Y Dodis,J Katz,S Xu et al.Strong Key-Insulated Signature Schemes[C].In:Public Key Cryptography-PKC 2003,Volume 2567 of Lecture Notes of ComPuter Science,Springer-Verlag,Berlin,Germany,2003:130~144
  • 6Nicolas González-Deleito,Olivier Markowitch,Emmanuel Dall'Olio.A New Key-Insulated Signature Scheme[C].In:Information and Communications Security(ICICS 2004),Volume 3269 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Germany,2004:465 ~479
  • 7Mihir Bellare,Oded Goldreieh,Shafi Goldwasser.Incremental Cryptography:The Case of Hashing and Signing[C].In:Y G Desmedt ed.Advances in Cryptology-Crypto'94,Volume 839 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Germany,1994:216~233
  • 8Mihir Bellare,Oded Goldreich,Shafi Goldwasser.Incremental Cryptography and Application to Virus Protection[C].In:Proceedings of the 27^th Annual ACM Symposium on the Theory of Computing,1995:45~56
  • 9Robert Johnson,David Molnar,Dawn Song et al.Homomorphic Signature Schemes[C].In:Proceedings of CT-RSA 2002,Volume 2271 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Heidelberg,2002:2441~262
  • 10Ron Steinfeld,Laurence Bull,Yuliang Zheng.Content Extraction Signatures[C].In:Proceedings of ICICS 2001,Volume 2288 of Lecture Notes of Computer Science,Springer-Verlag,Berlin,Heidelberg,2002:2851~304

共引文献51

同被引文献18

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部