期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
对一种密钥绝缘签名方案的改进 被引量:4
1
作者 程华琴 马传贵 高峰修 《信息工程大学学报》 2006年第1期1-3,共3页
自Dodis提出密钥绝缘的概念后,基于各种数学难题的密钥绝缘签名体制层出不穷,2004年密码年会上发表的论文“一个完备的强密钥绝缘签名方案”是基于RSA难解问题的,并指出符合完备的强密钥绝缘体制的性质,即N-1个时间段的私钥泄漏都不会... 自Dodis提出密钥绝缘的概念后,基于各种数学难题的密钥绝缘签名体制层出不穷,2004年密码年会上发表的论文“一个完备的强密钥绝缘签名方案”是基于RSA难解问题的,并指出符合完备的强密钥绝缘体制的性质,即N-1个时间段的私钥泄漏都不会影响其它时间段的签名安全,即使安全设备被腐化也不会影响私钥的安全。经过Cao zhengjun的研究发现该体制能轻易地被攻击。对此,我们提出了解决办法,降低了攻击成功的概率,提高了体制的安全性。 展开更多
关键词 密钥绝缘 签名体制 可伪造
下载PDF
基于密钥绝缘体制的多级代理签名体制 被引量:1
2
作者 程华琴 高峰修 马传贵 《微计算机信息》 北大核心 2005年第11X期38-40,共3页
本文通过分析密钥绝缘体制和多级代理签名体制性质,发现他们之间存在某些本质上的一致性,构造了一种新的多级代理签名体制。在这个签名体制中,代理签名者可以将原始签名者的签名权利进一步委托给新的代理签名者,使得新代理签名者也能够... 本文通过分析密钥绝缘体制和多级代理签名体制性质,发现他们之间存在某些本质上的一致性,构造了一种新的多级代理签名体制。在这个签名体制中,代理签名者可以将原始签名者的签名权利进一步委托给新的代理签名者,使得新代理签名者也能够代表原始签名者生成有效的数字签名。 展开更多
关键词 密钥绝缘 代理签名 多级代理
下载PDF
一种安全实用的大规模选举协议 被引量:2
3
作者 宋春来 殷新春 孟纯煜 《计算机应用与软件》 CSCD 北大核心 2008年第8期40-41,47,共3页
基于强(t,n)密钥绝缘的盲签名算法和哈希函数设计了一种安全实用的大规模选举协议。与现有的电子选举协议相比,该方案增强了签证机构签名私钥的安全性,其私钥每个阶段演化一次,而计票机构的验证公钥保持不变。投票人在不同的时段申请签... 基于强(t,n)密钥绝缘的盲签名算法和哈希函数设计了一种安全实用的大规模选举协议。与现有的电子选举协议相比,该方案增强了签证机构签名私钥的安全性,其私钥每个阶段演化一次,而计票机构的验证公钥保持不变。投票人在不同的时段申请签名和进行投票,可以有效地抵御拒绝服务攻击。同时,利用单向哈希函数的连接构造选票,保证了选票的秘密性。 展开更多
关键词 电子选举 强(t n)密钥绝缘 盲签名 哈希函数
下载PDF
IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE 被引量:4
4
作者 Wan Zhongmei Lai Xuejia +2 位作者 Weng Jian Liu Shengli Hong Xuan 《Journal of Electronics(China)》 2009年第6期853-858,共6页
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature sche... In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper,we applied Dodis,et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates. 展开更多
关键词 KEY-INSULATED Proxy signature Identity-based signature Key-exposure Bilinear pairings
下载PDF
Identity-based threshold key-insulated signature 被引量:3
5
作者 Chen Jianhong Chen Kefei Long Yu 《High Technology Letters》 EI CAS 2012年第3期275-280,共6页
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ... Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now. 展开更多
关键词 threshold key-insulated SIGNATURE random oracle model
下载PDF
ID-based Key-insulated Authenticated Key Agreement Protocol 被引量:1
6
作者 周渊 程晓明 柴震川 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第2期247-249,共3页
The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography ... The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate.However,exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost.In this paper,an ID-based authenticated key agreement protocol was presented.For solving the problem of key exposure of the basic scheme,the technique of key insulation was applied and a key insulated version is developed. 展开更多
关键词 ID-BASED KEY-INSULATED key agreement
下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
7
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
下载PDF
基于强Key-insulated的多级代理签名体制 被引量:3
8
作者 茹鹏 彭代渊 《信息安全与通信保密》 2007年第8期70-72,共3页
文中基于RSA密钥绝缘体制,提出了一种新的基于大整数分解困难性假设的多级代理签名方案。代理签名者在许可的范围内可将原始签名者的授权逐级下放,并保证被授权的各级代理签名者能生成有效的代理签名。新方案采用新的密钥绝缘体制,提高... 文中基于RSA密钥绝缘体制,提出了一种新的基于大整数分解困难性假设的多级代理签名方案。代理签名者在许可的范围内可将原始签名者的授权逐级下放,并保证被授权的各级代理签名者能生成有效的代理签名。新方案采用新的密钥绝缘体制,提高了安全性,达到了多级代理签名体制所需满足的要求。 展开更多
关键词 数字签名 代理签名 密钥绝缘 多级代理签名
原文传递
Certificateless key-insulated signature without random oracles 被引量:6
9
作者 Zhong-mei WAN Xue-jia LAI +3 位作者 Jian WENG Sheng-li LIU Yu LONG Xuan HONG 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第12期1790-1800,共11页
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signat... Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signature scheme. To handle issues concerning the private key leakage in certificateless signature schemes, we devise the first certificateless key-insulated signature scheme. Our scheme applies the key-insulated mechanism to certificateless cryptography, one with neither certificate nor key escrow. We incorporate Waters (2005)’s signature scheme, Paterson and Schuldt (2006)’s identity-based signature scheme, and Liu et al.(2007)’s certificateless signature scheme to obtain a certificateless key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved under the non-pairing-based generalized bilinear Diffie-Hellman (NGBDH) conjecture, without utilizing the random oracle model; second, it solves the key escrow problem in identity-based key-insulated signatures. 展开更多
关键词 KEY-INSULATED Key leakage CERTIFICATELESS Bilinear map
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部