期刊文献+

云计算中高效可即时撤销的无证书签名方案 被引量:4

Efficient revocable certificateless signature scheme for cloud computing
下载PDF
导出
摘要 针对云计算中无证书签名方案计算代价高、撤销不即时的缺点,提出一种基于椭圆曲线加密的可即时撤销签名方案。采用椭圆曲线标量乘运算降低计算开销,KGC(key generation center)将时间参数加密与系统主密钥结合生成时间密钥,当出现用户密钥泄漏或身份过期时,KGC立即更新撤销时间表中未被撤销用户的时间密钥,防止用户的隐私泄露。理论与仿真分析结果表明,方案在随机预言模型下被证明是安全的,并且能够抵抗已撤销用户的攻击。 Aiming at the certificateless signature schemes which have the shortcomings of high computational cost and unimme-diate revocation,an efficient and immediate revocable signature scheme was proposed based on elliptic curve cryptography.Elliptic curve scalar multiplication was used to reduce computational overhead.To prevent the user’s privacy from leaking,time parameter and system master key were combined to generate the time key.When a user’s key leaked or his identity expired,the time key in the revocation schedule was updated immediately by key generation center for those users who had not been revoked.Theoretical and simulation results show that the proposed scheme is secure under the random oracle model against the attack of revoked users.
作者 刘艳 王丹 汪祖民 段茹 LIU Yan;WANG Dan;WANG Zu-min;DUAN Ru(Dalian Key Laboratory of Environmental Perception and Intelligent Control,Dalian University,Dalian 116622,China;School of Information Engineering,Dalian University,Dalian 116622,China)
出处 《计算机工程与设计》 北大核心 2020年第9期2442-2446,共5页 Computer Engineering and Design
基金 辽宁省重点研发计划指导计划基金项目(2017104014) 辽宁省科学事业公益研究基金项目(20170053)。
关键词 云计算 无证书签名 椭圆曲线加密 时间密钥 即时撤销 cloud computing certificateless signature elliptic curve encryption time key immediate revocation
  • 相关文献

参考文献5

二级参考文献36

  • 1Al-Riyami S S,Paterson K.Certificateless Public Key Cryptography[C]//Proceedings of ASIACRYPT’03.Berlin,Germany:Springer-Verlag,2003:452-473.
  • 2Huang Xinyi,Mu Yi,Willy S,et al.Certificateless Signatures:New Schemes and Security Models[J].The Computer Journal,2012,55(4):457-474.
  • 3Du Hongzhen,Wen Qiaoyan.Certificateless Proxy Multi-signature[J].Information Sciences,2014,276:21-30.
  • 4Wang Boyang,Li Baochun,Li Hui,et al.Certificateless Public Auditing for Data Integrity in the Cloud[C]//Proceedings of IEEE Conference on Communications and Netw ork Security.Washington D.C.,USA:IEEE Press,2013:136-144.
  • 5Ju Hak-Soo,Kim D Y,Lee D H,et al.Efficient Revocation of Security Capability in Certificateless Public Key Cryptography[C]//Proceedings of KES’05.Berlin,Germany:Springer-Verlag,2005:453-459.
  • 6Yap W S,Sherman S MC,Heng Swee-Huay,et al.Security Mediated Certicateless Signatures[C]//Proceedings of ACNS’07.Berlin,Germany:Springer-Verlag,2007:459-477.
  • 7Shen Limin,Zhang Futai,Sun Yinxia.Efficient Revocable Certificateless Encryption Secure in the Standard Model[J].The Computer Journal,2014,57(4):592-601.
  • 8Sun Yinxia,Zhang Futai,Shen Limin,et al.A Revocable Certificateless Signature Scheme[J].Journal of Computers,2014,9(8):1843-1850.
  • 9Shamir A. Identity-Based cryptosystems and signature schemes. In:Proc. of the Crypto'84. LNCS 196, Springer-Verlag, 1984. 47-53.[doi:10.1007/3-540-39568-7_5].
  • 10Al-Riyami SS, Paterson K. Certificateless public key cryptography. In:Proc. of the Asiacrypt 2003. LNCS 2894, Springer-Verlag, 2003. 452-473.[doi:10.1007/978-3-540-40061-5_29].

共引文献14

同被引文献22

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部