期刊文献+

基于身份的可穿刺签名方案

Identity-based puncturable signature scheme
下载PDF
导出
摘要 针对已有前向安全的基于身份签名(IBS)方案在实际可用性和密钥更新效率方面存在的不足,基于可穿刺公钥加密方案的思想,提出了基于身份的可穿刺签名(IBPS)方案。具体而言,首先给出了IBPS的形式化定义和安全性定义,然后基于布隆过滤器构造了一个具体的IBPS方案。在计算性Diffie-Hellman假设下,所提方案在随机预言模型下满足存在不可伪造性。性能分析与仿真实验表明,所提方案比传统的前向安全IBS方案提供了更实用的细粒度前向安全性,且密钥更新过程更高效。 To overcome the shortcomings of available forward-secure identity-based signature(IBS)scheme in terms of actual practicability and secret key update efficiency,the notion of identity-based puncturable signature(IBPS)scheme was proposed based on the idea of puncturable public-key encryption scheme.Specifically,the syntax and security notion of IBPS were given,and then a concrete IBPS scheme was constructed based on Bloom filter.Under the computational Diffie-Hellman assumption,the proposed scheme achieved the existential unforgeability in the random oracle model.The performance analysis and implementation results demonstrate that,compared with traditional forward-secure IBS schemes,the proposed scheme provides more practical fine-grained forward secrecy,and has higher efficiency of secret key update.
作者 杨冬梅 陈越 魏江宏 胡学先 YANG Dongmei;CHEN Yue;WEI Jianghong;HU Xuexian(School of Data and Target Engineering,Information Engineering University,Zhengzhou 450001,China)
出处 《通信学报》 EI CSCD 北大核心 2021年第12期17-26,共10页 Journal on Communications
基金 国家自然科学基金资助项目(No.62172433,No.62172434)。
关键词 私钥泄露 基于身份的签名 可穿刺签名 布隆过滤器 key exposure identity-based signature puncturable signature Bloom filter
  • 相关文献

参考文献6

二级参考文献38

  • 1SAHAIA,WATERS B.Fuzzy identity based encryption[A].Proc of the Eurocrypt 2005[C].Heidelberg:Springer-Verlag,2005.457-473.
  • 2GOYAL V,PANDEY O,et al.Attribute-based eneryption for free-grained access control of encrypted data[A].Proc of the 13th ACM CCS[C].New York,2006.89-98.
  • 3WATERS B.Ciphertext-policy attribute based encryption:an expres-sive,efficient and provably secure realization[A].Proc of the PKC 2011 [C].Heidelberg:Springer-Verlag,2011.53-70.
  • 4CHASE M.Multi-authority attribute based encryption[A].Proc of the TCC 2007[C].Heidelberg:Springer-Verlag,2007.515-534.
  • 5CHASE M,CHOW S.Improving privacy and security in multi-authority attribute-based encryption[A].Proc of the 16thACMCCS[C].New York,2009.121-130.
  • 6LEWKO A,WATERS B.Decentralizing attribute-based encryption[A].Proc of the Eurocrypt 2011[C].Heidelberg:Springer-Verlag,2011.568-588.
  • 7LEWKO A,WATERS B.New proof methods for attribute-based en-cryption:achieving full security through selective techniques[A].Proc of the Crypto 2012[C].Heidelberg:Springer-Verlag,2012.180-198.
  • 8HOHENBERGER S,et al.Attribute based encryptiun:with fast de-cryption[A].Proc of the PKC 2013[C].Heidelberg:Springer-Verlag,2013.162-179.
  • 9ANDERSON R.Two Remarks on Public Key Cryptology[R].Invited Lecture at the 4th ACM Conference on Computer and Communica-tions Security,1997.
  • 10BELLARE M,MINER S K.A forward-secure digital signature scheme[A].Proc of the Crypto 1999[C].Heidelberg:Springer-Verlag,1999.431-448.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部