期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things
1
作者 Caifen Wang Bin Wu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1857-1878,共22页
The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizati... The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizations outsource their data computing tasks to cloud servers to obtain efficient and accurate computation while avoiding the cost of local data computing.One of the most important challenges facing outsourcing computing is how to ensure the correctness of computation results.Linearly homomorphic proxy signature(LHPS)is a desirable solution to ensure the reliability of outsourcing computing in the case of authorized signing right.Blockchain has the characteristics of tamper-proof and traceability,and is a new technology to solve data security.However,as far as we know,constructions of LHPS have been few and far between.In addition,the existing LHPS scheme does not focus on homomorphic unforgeability and does not use blockchain technology.Herein,we improve the security model of the LHPS scheme,and the usual existential forgery and homomorphic existential forgery of two types of adversaries are considered.Under the new model,we present a blockchain-based LHPS scheme.The security analysis shows that under the adaptive chosen message attack,the unforgeability of the proposed scheme can be reduced to the CDH hard assumption,while achieving the usual and homomorphic existential unforgeability.Moreover,comparedwith the previous LHPS scheme,the performance analysis shows that our scheme has the same key size and comparable computational overhead,but has higher security. 展开更多
关键词 Homomorphic signature proxy signature security model provable security unforgeability
下载PDF
Multi-Receiver Signcryption Scheme with Multiple Key Generation Centers through Public Channel in Edge Computing 被引量:1
2
作者 Lipeng Wang Zhi Guan +1 位作者 Zhong Chen Mingsheng Hu 《China Communications》 SCIE CSCD 2022年第4期177-198,共22页
The emerging edge computing technology for the Internet of Things has been playing an important role in our daily life. It is promising to utilize a multi-receiver signcryption scheme to protect the transmission data ... The emerging edge computing technology for the Internet of Things has been playing an important role in our daily life. It is promising to utilize a multi-receiver signcryption scheme to protect the transmission data when an edge device broadcasts its sensing data to many different end devices at a time.There are several things to consider when we design a signcryption scheme. First existing schemes need to maintain a secure channel to generate the user private key, which may increase economic costs. Second the system private key of those schemes is kept secret by a single key generation center(KGC), and the single point of failure of KGC may compromise the whole system. For this, we propose a multi-receiver multimessage signcryption scheme without the secure channel. Firstly the scheme allows KGC to send secrets through the public channel, which reduces maintenance costs. Secondly, to eliminate the single point of failure, the scheme utilizes multiple KGCs to manage the system private key, and updates the secret of each KGC periodically to resist advanced persistent threat attacks. We demonstrate that the proposed scheme can achieve expected security properties. Performance analysis shows that it is with shorter ciphertext length and higher efficiency. 展开更多
关键词 internet of things SIGNCRYPTION edge computing unforgeability CONFIDENTIALITY
下载PDF
An Efficient Certificateless Ring Signature Scheme
3
作者 ZHU Lijun ZHANG Futai 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期567-571,共5页
To overcome the drawbacks such as high computational cost, unreasonable security model and long signature length in existing certificateless ring signature schemes, we propose an efficient certificateless ring signatu... To overcome the drawbacks such as high computational cost, unreasonable security model and long signature length in existing certificateless ring signature schemes, we propose an efficient certificateless ring signature scheme in this paper. Our construction is inspired by some efficient ID-based ring signature schemes, and uses bilinear pairings as a basic tool. Using a reasonable security model, the unforgeability of the proposed scheme is proven based on the intractability of the computational Diffie-Hellman (CDH) problem. The signature length of the new scheme is only |G2|+n|G1| (|Gi| is the bit length of an element in group Gi, i =1, 2). Compared with other existing certificateless ring signature schemes, the newly proposed scheme has a shorter signature length and is more efficient and practical. 展开更多
关键词 certificateless ring signature unforgeability bilinear pairings CDH problem
下载PDF
Failed Reconciliation in The Narrow Road to the Deep North
4
作者 王秀秀 《海外英语》 2021年第6期222-223,共2页
The Narrow Road to the Deep North,a novel composed by Richard Flanagan,a well-known Australian contemporary nov⁃elist,depicts a grand political picture of Australia,from the lens of individual’s psyche.The domination... The Narrow Road to the Deep North,a novel composed by Richard Flanagan,a well-known Australian contemporary nov⁃elist,depicts a grand political picture of Australia,from the lens of individual’s psyche.The domination of the official history en⁃courages forgetting as a way to deal with the painful history,the Burma camp in the novel,while the minorities,who rise up,fighting against the imposed official history by constructing the counter memory,are trapped in the identity confusion.Literature is used by both the perpetrators and the survivors as means to pursuing for reconciliation but both failed for the perpetrators use it as a way of forgetting which contributes to the prevailing unforgiveness in the novel,and further contributes the victims’failed reconciliation. 展开更多
关键词 counter memory unforgiveness IDENTITY failed reconciliation
下载PDF
Forward-Secure Digital Signature Scheme with Tamper Evidence
5
作者 JIANG Han XU Qiuliang LIN Fengbo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期582-586,共5页
Based on the definition of tamper evidence, the authors define a new notion of tamper evidence forward secure signature scheme (TE-FSig), and propose a general method to build a TE-FSig scheme. Based on this method,... Based on the definition of tamper evidence, the authors define a new notion of tamper evidence forward secure signature scheme (TE-FSig), and propose a general method to build a TE-FSig scheme. Based on this method, they also give out a concrete instance. A TE-FSig scheme is constructed by the standard signature scheme, forward secures signature scheme and the aggregate signature scheme. It has an additional property of tamper evidence besides the property of forward secure, which can detect the time period when the key is exposed. In the standard model, the scheme constructed in the paper is proved to satisfy the prop- erties of forward secure, strong forward tamper-evidence secure, and strongly unforgeable under the chosen-message attack. 展开更多
关键词 tamper evidence forward secure bilinear map aggregate signature strongly unforgeable strong forward tamper-evidence secure
下载PDF
Generic Transformation from Weakly to Strongly Unforgeable Signatures 被引量:1
6
作者 黄琼 王石 +1 位作者 李进 赵一鸣 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第2期240-252,共13页
Current techniques for transforming unforgeable signature schemes (the forged message has never been signed) to strongly unforgeable ones (the forged message could have been signed) require supplementary component... Current techniques for transforming unforgeable signature schemes (the forged message has never been signed) to strongly unforgeable ones (the forged message could have been signed) require supplementary components to be added onto the original key pairs of the schemes. In addition, some of them can only be applied to a certain type of signature schemes. In this paper, we propose a new generic transformation technique which converts any unforgeable signature scheme into a strongly unforgeable one without modifying any component in the original key pair. This makes our technique especially compatible for practical use. Our technique is based on strong one-time signature schemes. We show that they can be constructed efficiently from any one-time signature scheme that is based on one-way functions. The performance of our technique also compares favorably with that of current ones. Besides, it is shown in this paper that our transformation can further be applied to schemes satisfying only a weak variant of unforgeability without any further modification. Furthermore, our technique can also be used for constructing strongly unforgeable signature schemes in other cryptographic settings which include certificateless signature, identity-based signature, and several others. To the best of our knowledge, similar extent of versatility is not known to be supported by any of those comparable techniques. Finally and of independent interest, we show that our generic transformation technique can be modified to an on-line/off-line signature scheme, which possesses a very efficient signing process. 展开更多
关键词 SIGNATURE strong unforgeability weak unforgeability one-time signature
原文传递
Novel efficient identity-based signature on lattices 被引量:1
7
作者 Jiang-shan CHEN Yu-pu HU +1 位作者 Hong-mei LIANG Wen GAO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第2期244-250,共7页
With the rapid development of electronic information technology,digital signature has become an indispensable part of our lives.Traditional public key certificate cryptosystems cannot overcome the limitations of certi... With the rapid development of electronic information technology,digital signature has become an indispensable part of our lives.Traditional public key certificate cryptosystems cannot overcome the limitations of certificate management.Identity-based cryptosystems can avoid the certificate management issues.The development of quantum computers has brought serious challenges to traditional cryptography.Post-quantum cryptography research is imperative.At present,almost all post-quantum identity-based signature(IBS)schemes are constructed using Gaussian sampling or trapdoor technologies.However,these two technologies have a great impact on computational efficiency.To overcome this problem,we construct an IBS scheme on lattices by employing Lyubashevsky’s signature scheme.Based on the shortest vector problem on lattices,our scheme does not use Gaussian sampling or trapdoor technologies.In the random oracle model,it is proved that our scheme is strongly unforgeable against adaptive chosen messages and identity attacks.The security level of our scheme is strongly unforgeable,which is a higher level than the existential unforgeability of other schemes.Compared with other efficient schemes,our scheme has advantages in computation complexity and security. 展开更多
关键词 Identity-based signature LATTICE Strong unforgeability Random oracle model
原文传递
Attribute-based signatures on lattices 被引量:2
8
作者 Xie Jia Hu Yupu +2 位作者 Gao Juntao Gao Wen Li Xuelian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第4期83-90,共8页
Because of its wide application in anonymous authentication and attribute-based messaging, the attribute-based signature scheme has attracted the public attention since it was proposed in 2008. However, most of the ex... Because of its wide application in anonymous authentication and attribute-based messaging, the attribute-based signature scheme has attracted the public attention since it was proposed in 2008. However, most of the existing attribute-based signature schemes are no longer secure in quantum era. Fortunately, lattice-based cryptography offers the hope of withstanding quantum computers. And lattices has elevated it to the status of a promising potential alternative to cryptography based on discrete log and factoring, owing to implementation simplicity, provable security reductions and quantum-immune. In this paper, the first lattice attribute-based signature scheme in random oracle model is proposed, which is proved existential unforgeability and perfect privacy. Compared with the current attribute-based signature schemes, our new attribute-based signature scheme can resist quantum attacks and has much shorter public-key size and signature size. Furthermore, this scheme is extended into an attribute-based signature scheme on number theory research unit(NTRU) lattice, which is also secure even in quantum era and has much higher efficiency than the former. 展开更多
关键词 attribute signature lattice unforgeability perfect privacy
原文传递
Attribute-Based Signature with Policy-and-Endorsement Mechanism 被引量:1
9
作者 王怀习 朱岩 +1 位作者 冯荣权 Stephen S.Yau 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第6期1293-1304,共12页
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption.This signature provides a policy-and-end... In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption.This signature provides a policy-and-endorsement mechanism.In this mechanism a single user,whose attributes satisfy the predicate,endorses the message.This signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the signer.The security of this signature,selfless anonymity and existential unforgeability,is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups. 展开更多
关键词 cryptography fine-grained access control attribute-based signature policy-and-endorsement selfless anonymity existential unforgeability
原文传递
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme
10
作者 刘胜利 陈晓峰 张方国 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第2期265-269,共5页
Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system Very recently, Wang, Tang and Li proposed a neW ID-based restrictive partially blind signature (ID-RPB... Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system Very recently, Wang, Tang and Li proposed a neW ID-based restrictive partially blind signature (ID-RPBS) and gave the security proof. In this paper, we present a cryptanalysis of the scheme and show that the signature scheme does not satisfy the property of unforgeability as claimed. More precisely, a user can forge a valid message-signature pair (ID, msg, info', σ') instead of the original one (ID, msg, info, σ), where info is the original common agreed information and info'≠info. Therefore, it will be much dangerous if Wang-Tang-Li's ID-RPBS scheme is applied to the off-line electronic cash system. For example, a bank is supposed to issue an electronic coin (or bill) of $100 to a user, while the user can change the denomination of the coin (bill) to any value, say $100 000 000, at his will. 展开更多
关键词 unforgeability restrictive partially blind signature ID-based cryptography electronic cash
原文传递
Zero-pole cancellation for identity-based aggregators:a constant-size designated verifier-set signature
11
作者 E CHEN Yan ZHU +1 位作者 Changlu LIN Kewei LV 《Frontiers of Computer Science》 SCIE EI CSCD 2020年第4期197-210,共14页
In this paper we present a designated verifier-set signature(DVSS),in which the signer allows to designate many verifiers rather than one verifier,and each designated verifier can verify the validity of signature by h... In this paper we present a designated verifier-set signature(DVSS),in which the signer allows to designate many verifiers rather than one verifier,and each designated verifier can verify the validity of signature by himself.Our research starts from identity-based aggregator(IBA)that compresses a designated set of verifier’s identities to a constant-size random string in cryptographic space.The IBA is constructed by mapping the hash of verifier’s identity into zero or pole of a target curve,and extracting one curve’s point as the result of aggregation according to a specific secret.Considering the different types of target curves,these two IBAs are called as zeros-based aggregator and poles-based aggregator,respectively.Based on them,we propose a practical DVSS scheme constructed from the zero-pole cancellation method which can eliminate the same elements between zeros-based aggregator and poles-based aggregator.Due to this design,our DVSS scheme has some distinct advantages:(1)the signature supporting arbitrary dynamic verifiers extracted from a large number of users;and(2)the signature with short and constant length.We rigorously prove that our DVSS scheme satisfies the security properties:correctness,consistency,unforgeability and exclusivity.This is a preview of subscription content,log in to check access. 展开更多
关键词 designated verifier-set signature aggregator unforgeability exclusivity
原文传递
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
12
作者 葛爱军 黄欣沂 +2 位作者 陈成 马传贵 张锐 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第4期743-748,共6页
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellman assumption in the random oracle model. Unfortunately, by carefully revisiting the design and security proof of Wang et alfs scheme, we show that their scheme cannot provide unforgeability, namely, a forger, whose attributes do not satisfy a given signing predicate, can also generate valid signatures. We also point out the flaws in Wang et al.'s proof. 展开更多
关键词 attribute-based signature existential unforgeability policy-and-endorsement
原文传递
Improved lattice-based ring signature schemes from basis delegation 被引量:1
13
作者 Gao Wen Hu Yupu +1 位作者 Wang Baocang Xie Jia 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第3期11-17,28,共8页
Ring signature enables the members to sign anonymously without a manager, it has many online applications, such as e-voting, e-money, whistle blowing etc. As a promising post-quantum candidate, lattice-based cryptogra... Ring signature enables the members to sign anonymously without a manager, it has many online applications, such as e-voting, e-money, whistle blowing etc. As a promising post-quantum candidate, lattice-based cryptography attracts much attention recently. Several efficient lattice-based ring signatures have been naturally constructed from lattice basis delegation, but all of them have large verification key sizes. Our observation finds that a new concept called the split- small integer solution (SIS) problem introduced by Nguyen et al. at PKC'I 5 is excellent in reducing the public key sizes of lattice-based ring signature schemes from basis delegation. In this research, we first define an extended concept called the extended split-SIS problem, and then prove that the hardness of the extended problem is as hard as the approximating shortest independent vectors problem (SIVP) problem within certain polynomial factor. Moreover, we present an improved ring signature and prove that it is anonymous and unforgeable against the insider corruption. Finally, we give two other improved existing ring signature schemes from lattices. In the end, we show the comparison with the original scheme in terms of the verification key sizes. Our research data illustrate that the public key sizes of the proposed schemes are reduced significantly. 展开更多
关键词 lattice-based ring signature scheme ANONYMOUS unforgeable
原文传递
Identity-Based Blind Signature from Lattices
14
作者 GAO Wen HU Yupu +2 位作者 WANG Baocang XIE Jia LIU Momeng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第4期355-360,共6页
Blind signature allows a user to get a signature of a signer on an arbitrary message,and the verifier can convince that the signature is indeed signed by the signer without leaking any information about the message.Th... Blind signature allows a user to get a signature of a signer on an arbitrary message,and the verifier can convince that the signature is indeed signed by the signer without leaking any information about the message.This property is necessary when the user’s privacy needs protection,such as a bank bill,a trade secret,etc.As an alternative of public key infrastructure,the identity-based system can simplify the key management procedures in certificate-based public key systems.Inspired by the requirement of identity-based blind signature in the post quantum world,we research on identity-based blind signature based on hard lattice problems under the random Oracle model.We propose a construction built upon the blind signature by Rückert,and it is proved to be one-more unforgeable against selective identity and chosen message attacks(s ID-CMA)and unconditionally blind.The proposed scheme has 2 moves,and its security can be reduced to the small integer solution(SIS)problem. 展开更多
关键词 lattice-based cryptography identity-based blind signature unforgeable
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部