期刊文献+

基于直接匿名证明的k次属性认证方案 被引量:5

k-times attribute-based authentication scheme using direct anonymous attestation
下载PDF
导出
摘要 当前,已有k次属性认证(简称k-TABA)方案以及相关属性认证方案的主要缺点是认证子协议的运算复杂度依赖于属性认证策略的规模,而且并未考虑成员废除和属性更新问题。基于直接匿名证明、集合成员身份证明和密文策略属性加密技术构造了新的k-TABA方案。为了进一步优化用户端运算效率,首先对底层属性加密方案进行修改,然后利用Green等的密钥绑定技术对解密过程进行外包。该方案不但可部署于可信平台,而且支持可表述性认证策略。此外,该方案满足多个理想性质,诸如注册过程可验证性、成员废除和属性更新等。该方案最显著的性能优势是用户在认证阶段的运算开销为常数。 At present,the main drawbacks of existing k-times attribute-based authentication(abbreviated to k-TABA)schemes and related attribute-based authentication schemes are that the computation cost of the authentication process depends on the size of the access formula and none of these schemes considers the problems of member revocation and attribute update.A new k-TABA scheme was constructed based on the building blocks of direct anonymous attestation,set membership proof and ciphertext-policy attribute-based encryption.Moreover,in order to reduce user’s calculation as much as possible,the underlying attribute-based encryption scheme was modified,and then the main decryption operations were outsourced by using the key binding technique of Green et al.The new scheme can be deployed on a trusted platform and support expressive authentication policies.In addition,it also satisfies several ideal properties,such as registration process verifiability,member revocation,attribute update,and so on.The significant performance advantage of the new scheme is that the computation overhead of the user in the authentication phase is constant.
作者 柳欣 徐秋亮 张斌 张波 LIU Xin;XU Qiuliang;ZHANG Bin;ZHANG Bo(Shandong Youth University of Political Science),Ji’nan 250103,China;Key Laboratory of Information Security and Intelligent Control in Universities of Shandong (Shandong Youth University of Political Science),Ji’nan 250103,China;Software College,Shandong University,Ji’nan 250101,China;School of Information Science and Engineering,University of Ji’nan,Ji’nan 250022,China)
出处 《通信学报》 EI CSCD 北大核心 2018年第12期113-133,共21页 Journal on Communications
基金 国家自然科学基金资助项目(No.61173139) 山东省自然科学基金资助项目(No.ZR2015FL023 No.ZR2014FL011 No.ZR2015FL022) 山东省高等学校科学技术计划基金资助项目(No.J17KA081 No.J15LN16 No.J13LN23) 山东青年政治学院博士科研启动经费资助项目(No.14A007)~~
关键词 属性认证 直接匿名证明 密文策略属性加密 线性秘密分享 外包解密 attribute-based authentication direct anonymous attestation ciphertext-policy attribute-based encryption linear secret sharing outsourced decryption
  • 相关文献

参考文献3

二级参考文献98

  • 1鲁荣波,宣恒农,何大可.对一种高效群签名方案的安全性分析[J].通信学报,2007,28(4):9-12. 被引量:6
  • 2TERANISHI I, FURUKAWA J, SAKO K. K-times anonymous authentication[A]. Proceedings of ASIACRYPT 2004[C]. Berlin: Spdnger-Verlag, 2004. 308-322.
  • 3NGUYEN L, SAFAVI-NAINI R. Dynamic k-times anonymous authentication[A]. Proceedings of ACNS 2005[C]. Berlin: Springer- Verlag, 2005.318-333.
  • 4TERANISHI I, SAKO K. K-times anonymous authentication with a constant proving cost[A]. Proceedings of PKC 2006[C]. Berlin: Springer-Verlag, 2006. 525-542.
  • 5TERANISHI I, FURUKAWA J, SAKO K. K-times anonymous authentication[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009, 92(1): 147-165.
  • 6NGUYEN L. Efficient dynamic k-times anonymous authentication[EB/OL], http:lleprint.iacr.orgl20071006, 2007-01-07/2011-03-01.
  • 7AU M H, SUSILO W, MU Y. Constant-size dynamic k-TAA[EB/OL]. http://eprint.iacr.org/2008/136, 2008-03-31/2010-02-01.
  • 8EMURA K, MIYAJI A, OMETE K. A selectable k-times relaxed anonymous authentication scheme[A]. Proceedings of WISA 2009[C]. Berlin: Springer-Verlag, 2009.281-295.
  • 9BICHSEL P. Theft and Misuse Protection for Anonymous Credentials[D]. ZUrich: Swiss Federal Institute of Technology, Switzerland, 2007.
  • 10CAMENISCH J. Protecting (anonymous) credentials with the trusted computing group's TPM v1.2[A]. Proceedings of SEC 2006[C]. Berlin: Springer-Verlag, 2006. 135-147.

共引文献53

同被引文献18

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部