期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Escrow-Free Certificate-Based Authenticated Key Agreement Protocol from Pairings 被引量:1
1
作者 WANG Shengbao CAO Zhenfu 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期63-66,共4页
Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (C... Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (CB-AK) protocol with perfect forward secrecy is proposed. Our protocol makes use of pairings on elliptic curves. The protocol is described and its properties are discussed though comparison with Smart's protocol. 展开更多
关键词 authenticated key agreement (AK) certificatebased encryption (CBE) PAIRINGS session key escrow perfect forward security
下载PDF
Improved ID-Based Signature Scheme Solving Key Escrow
2
作者 廖剑 戚英豪 +2 位作者 黄佩伟 戎蒙括 李生红 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期121-126,共6页
Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest private key generator (PKG) can forge the signature of any user, meanwhile, the user can deny the signature actually si... Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest private key generator (PKG) can forge the signature of any user, meanwhile, the user can deny the signature actually signed by him/herself. To avoid the keyescrow problem, an ID-based signature scheme was presented without trusted PKG. The exact proof of security was presented to demonstrate that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman (CDH) problem. Compared with other signature schemes, the proposed scheme is more efficient. 展开更多
关键词 CRYPTOGRAPHY ID-based signature bilinear pairings key escrow trusted private key generator
下载PDF
Towards accountable authority attribute-based encryption 被引量:1
3
作者 王永涛 Chen Kefei Long Yu 《High Technology Letters》 EI CAS 2013年第1期82-87,共6页
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It ... An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It is a novel approach to mitigate the (inherent) key escrow problem in identity-based cryptosystems. In this work, the concept of accountable authority to attribute-based encryption (ABE) setting is generalized for the first time, and then a construction is given. The scheme non-trivially integrates an A-IBE scheme proposed by Libert et al. with an ABE scheme. In our construction, a user will be identified by a pair ( id, o~), where id denotes the user' s identity and ω denotes the set of attributes associated to the user. In addition, our construction is shown to be secure under some reasonable assumptions. 展开更多
关键词 CRYPTOGRAPHY attribute-based encryption accountable authority key escrow TRACEABILITY
下载PDF
A privacy-preserving data aggregation system based on blockchain in VANET
4
作者 Ruicheng Yang Guofang Dong +2 位作者 Zhengnan Xu Juangui Ning Jianming Du 《Blockchain(Research and Applications)》 EI 2024年第3期140-152,共13页
In the realm of vehicular ad hoc networks(VANETs),data aggregation plays a pivotal role in bringing together data from multiple vehicles for further processing and sharing.Erroneous data feedback can significantly imp... In the realm of vehicular ad hoc networks(VANETs),data aggregation plays a pivotal role in bringing together data from multiple vehicles for further processing and sharing.Erroneous data feedback can significantly impact vehicle operations,control,and overall safety,necessitating the assurance of security in vehicular data aggregation.Addressing the security risks and challenges inherent in data aggregation within VANETs,this paper introduces a blockchain-based scheme for secure and anonymous data aggregation.The proposed scheme integrates cloud computing with blockchain technology,presenting a novel blockchain-based data aggregation system that robustly supports efficient and secure data collection in VANETs.Leveraging key escrow resilience mechanisms,the solution ensures the security of system keys,preventing the security problems caused by keys generated by third parties alone in the past.Furthermore,through secondary data aggregation,fine-grained data aggregation is achieved,providing effective support for cloud services in VANETs.The effectiveness of the proposed scheme is confirmed through security analysis and performance evaluations,demonstrating superior computational and communication efficiency compared existing alternatives. 展开更多
关键词 Vehicular ad hoc networks Data aggregation Blockchain key escrow resilience ANONYMITY
原文传递
A threshold key escrow scheme based on public key cryptosystem 被引量:16
5
作者 曹珍富 《Science China(Technological Sciences)》 SCIE EI CAS 2001年第4期441-448,共8页
In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no... In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme. 展开更多
关键词 key escrow scheme threshold cryptography public key cryptosystem improved RSA cryptosystem LEAF
原文传递
An Improved Ring Signature Scheme without Trusted Key Generation Center for Wireless Sensor Network 被引量:1
6
作者 肖俊芳 曾贵华 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第2期189-194,共6页
Security of wireless sensor network (WSN) is a considerable challenge, because of limitation in energy, communication bandwidth and storage. ID-based cryptosystem without checking and storing certificate is a suitab... Security of wireless sensor network (WSN) is a considerable challenge, because of limitation in energy, communication bandwidth and storage. ID-based cryptosystem without checking and storing certificate is a suitable way used in WSN. But key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest key generation center (KGC) can forge the signature of any node and on the other hand the node can deny the signature actually signed by him/herself. To solving this problem, we propose an ID-based ring signature scheme without trusted KGC. We also present the accurate secure proof to prove that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman (CDH) problem. Compared with other ring signature schemes, we think proposed scheme is more efficient. 展开更多
关键词 wireless sensor network SIGNATURE bilinear pairings key escrow trusted key generation center (KGC)
原文传递
Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing 被引量:2
7
作者 王亮亮 陈克非 +1 位作者 毛贤平 王永涛 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期398-405,共8页
In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencry... In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencryption (PRE) as the cloud data encryption technique. In a PRE system, a semi-trusted proxy can transform a ciphertext under one public key into a ciphertext of the same message under another public key, but the proxy cannot gain any information about the message. In this paper, we propose a certificateless PRE (CL-PRE) scheme without pairings. The security of the proposed scheme can be proved to be equivalent to the computational Dire- Hellman (CDH) problem in the random oracle model. Compared with other existing CL-PRE schemes, our scheme requires less computation cost and is significantly more efficient. The new scheme does not need the public key certificates to guarantee validity of public keys and solves the key escrow problem in identity-based public key cryptography. 展开更多
关键词 cloud computing secure data sharing proxy re-encryption(PRE) certificateless encryption key escrow computational Diffie-Hellman(CDH) problem random oracle
原文传递
EFFICIENT CERTIFICATELESS THRESHOLD SIGNATURES WITHOUT RANDOM ORACLES
8
作者 Piyi YANG Zhenfu CAO Xiaolei DONG 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2010年第6期1167-1182,共16页
This paper defines the security notion for Certificateless Threshold Signatures (CLTHS). Different from the adversarial model defined by Wang, et al. (2007), our definition considers Type I and Type II adversary s... This paper defines the security notion for Certificateless Threshold Signatures (CLTHS). Different from the adversarial model defined by Wang, et al. (2007), our definition considers Type I and Type II adversary separately. At the same time, the authors develop the simulatability and relationship between certificateless threshold signature and the underlying certificateless signature. We also propose the first CLTHS scheme which is proved existentially unforgeable against adaptively chosen message attack without random oracles. Compared with the previous scheme by Wang, et al. (2007), our scheme does not use hash function and is more efficient. 展开更多
关键词 CERTIFICATELESS digital signature key escrow provable security THRESHOLD ROBUSTNESS simulatabiltiy.
原文传递
A Practical Identity-Based Signature Scheme
9
作者 LI Chenghua ZHU Jianxin +2 位作者 WU Junjun ZHANG Xinfang DENG Qian 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期692-696,共5页
Many identity-based signature (IBS) schemes solving key escrow were proposed, But the updating of the private keys wasn't discussed in these literatures. For the problem of key update, an identity-based key-insulat... Many identity-based signature (IBS) schemes solving key escrow were proposed, But the updating of the private keys wasn't discussed in these literatures. For the problem of key update, an identity-based key-insulated signature scheme with secure key-updates has been proposed. But their scheme inherited the key escrow property. In this paper, we propose a new identity-based strong key-insulated signature scheme without key escrow. It makes the IBS scheme more applicable to the real world. After analyzing the security and the performance, an application example in E-passport passive authentication scenario is described. 展开更多
关键词 identity-based signature(IBS) key escrow key update key-insulated signature
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部