期刊文献+

去中心基于属性不可否认签名 被引量:3

Decentralized attribute-based undeniable signature
下载PDF
导出
摘要 将基于属性、不可否认和去中心3个概念相结合,提出去中心基于属性不可否认签名的定义和安全模型,并基于离散对数困难问题构造一个无双线性对的方案。该方案主要基于Cramer等的证据隐藏零知识证明协议,以Schnorr协议作为其基础Σ协议,以Shamir门限方案作为其秘密分享方案;再使用Fiat-Shamir转换得到一个(t,n)门限签名(BTS)方案;然后再对BTS方案进行不可否认、防共谋和去中心化处理;最后得到一个去中心基于属性不可否认签名方案,并在随机预言机模型下证明了其安全性。 Combining the concepts of attribute-based,undeniability and decentralization,a new concept of decentralized attribute-based undeniable signature with formal security model is proposed,and a concrete non-bilinear pair scheme based on discrete logarithm difficulty problem is constructed.The scheme uses the witness-hiding zero-knowledge proof protocol proposed by Cramer et al.And the Schnorr protocol as the basicΣprotocol,and uses the Shamir threshold scheme as its secret sharing scheme.Then,Fiat-Shamir transformation is used to obtain a(t,n)threshold signature(BTS)scheme.Then,undeniability,anti-collusion,and decentralization are performed on the BTS scheme.Finally,a decentralized attributes-based undeniable signature scheme is obtained,and its security is proved under the random oracle model.
作者 魏亮 黄振杰 陈群山 WEI Liang;HUANG Zhen-jie;CHEN Qun-shan(Fujian Key Laboratory of Granular Computing and Application(Minnan Normal University),Zhangzhou 363000;School of Computer Science,Minnan Normal University,Zhangzhou 363000,China)
出处 《计算机工程与科学》 CSCD 北大核心 2020年第6期1003-1011,共9页 Computer Engineering & Science
基金 福建省自然科学基金(2019J01750) 福建省中青年教师教育科研项目(JAT170345,JAT170346)。
关键词 数字签名 基于属性签名 不可否认签名 去中心 随机预言机模型 digital signature attribute-based signature undeniable signature decentralization random oracle model
  • 相关文献

参考文献5

二级参考文献23

  • 1MAMBO M, USUDA K, OKAMOTO E. Proxy Signature: Delegation of the Power to Sign Messages[J]. IEICE Trans. Fundamentals, 1996(E79-A):1338- 1353.
  • 2GOYAL V, PANDEYY O, SAHAIZ A. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]. USA: ACM Press, 2006:89-98.
  • 3GUO S O, ZENG Y P. Attribute-based Signature Scheme[C]. USA: IEgg Computer Society, 2008:509-511.
  • 4FLORIAN Hess. Efficient Identity Based Signature Schemes Based on Pairings [C]. Berlin/Heidelberg: Springer, 2003:310-324.
  • 5Shamir A. Identity-based cryptosystems and signatures schemes [C]//Proceedings of CRYPTO 84 on Advances in Cryptology. 1985 :47-53.
  • 6Boneh D, Franklin M. Identity based encryption from the well Pairing[C-]//Proceedings of the 21st Annual International Cryp- tology Conference on Advances in Cryptolngy. California, USA, August 19-23,2001:213-229.
  • 7Sahai A, Waters B. Fuzzy Identity-Based Encryption[C]//Pro- ceedings of EUROCRYPT. Aarhus, Denmark, May 2005: 457- 473.
  • 8Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Procee- dings of ACM Conference on Computer and Communications Se- curity. New York,USA, 2006 : 221-238.
  • 9Yang P,Cao Z,Dong X. Fuzzy identity based signature[R]. Re- port 2008/002. IACR Cryptology ePrint Archive, 2008.
  • 10Guo S, Zeng Y. Attribute-based signature scheme [C]// Procee- dings of the 2nd International Conference on Information Securi- ty and Assurance. Busan, Korea, April 2008:509-511.

共引文献60

同被引文献10

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部