期刊文献+

信任协商中基于环签名的协商证书匿名方案

Anonymous credentials scheme based on ring signature for trust negotiation
下载PDF
导出
摘要 信任协商中的隐私保护方案大多建立在复杂的零知识协议基础上且很多需要配对运算,因此效率不高。针对这一问题,利用环签名的思想提出了一种协商证书匿名方案,在建立证书子集匿名性的形式化模型基础上利用离散对数的困难性构造环签名方案对协商证书进行保护。跟张明武等人的方案(张明武,杨波,祝胜林,等.保护协商证书隐私的策略签名方案.电子与信息学报,2009,31(1):224-227)和LIU等人的方案(LIU BAILING,LUHONGWEI,ZHAO YIZHU.An efficient automated trust negotiation framework supporting adaptive policies.Proceedings ofthe Second International Workshop on Education Technology and Computer Science.Washington,DC:IEEE Computer Society,2010:96-99)相比,所提方案具有更高的效率。 At present,most of the privacy protection schemes are based on sophisticate zero-knowledge protocol or bilinear mapping computation,so their efficiency is low.In order to address this problem,an anonymous negotiation credentials scheme was proposed based on ring signature.On the foundation of anonymous credentials framework,an efficient discrete logarithm based ring signature scheme was constructed to protect the negotiation credentials,compared with two schemes proposed by ZHANG,et al.(ZHANG MING-WU,YANG BO,ZHU SHENG-LIN,et al.Policy-Based Signature Scheme for Credential Privacy Protecting in Trust Negotiation.Journal of Electronics Information Technology,2009(1): 224-227) and LIU,et al.(LIU BAILING,LU HONGWEI,ZHAO YIZHU.An efficient automated trust negotiation framework supporting adaptive policies.Proceedings of the Second International Workshop on Education Technology and Computer Science.Washington,DC: IEEE Computer Society,2010: 96-99) the proposed scheme is more efficient.
出处 《计算机应用》 CSCD 北大核心 2011年第10期2689-2691,共3页 journal of Computer Applications
基金 国家863计划项目(2009AA01Z403 2009AA01Z435)
关键词 信任协商 环签名 协商证书 匿名方案 trust negotiation ring signature negotiation credential anonymous scheme
  • 相关文献

参考文献13

  • 1HOLT J, BRADSHAW R, SEAMONS K E, et al. Hidden creden- tials [ C]// Proceedings of 2003 ACM Workshop on Privacy in the Electronic Society. New York: ACM Press, 2003:1 - 8. 被引量:1
  • 2洪帆,刘磊.用隐藏证书实现访问策略[J].计算机应用,2005,25(12):2731-2733. 被引量:4
  • 3QIN YU, FENG DENGGUO, XU ZHEN. An anonymous property- based attestation protocol from bilinear maps [ C]// Proceedings of 2009 International Conference on Computational Science and Engi-neering. Washington, DC: IEEE Computer Society, 2009: 732- 738. 被引量:1
  • 4刘吉强,赵佳,赵勇.可信计算中远程自动匿名证明的研究[J].计算机学报,2009,32(7):1304-1310. 被引量:18
  • 5廖俊国,洪帆,李俊,杨木祥.在信任协商中保密证书的敏感属性[J].通信学报,2008,29(6):20-25. 被引量:7
  • 6BAGGA W, MOLVA R. Policy-based cryptography and applications [ C]//Proceedings of the 9th International Conference on Financial Cryptography and Data Security, LNCS 3570. Berlin: Springer, 2005 : 72 - 83. 被引量:1
  • 7SQUICCIARINI A C, BERTINO E, FERRARI E, et al. Achieving privacy in trust negotiations with an ontology-based approach [ J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3 (1) : 13 -30. 被引量:1
  • 8FRIKKEN K, ATALLAH M, LI JIANGTAO. Attribute-based access control with hidden policies and hidden credentials [ J]. IEEE Transactions on Computers, 2006, 55(10) : 1259 - 1270. 被引量:1
  • 9官尚元,伍卫国,董小社,梅一多.面向属性约束的自动信任协商模型[J].西安交通大学学报,2009,43(8):1-5. 被引量:1
  • 10GUAN SHANGYUAN, DONG XIAOSHE, MEI YIDUO, et al. Au- tomated trust negotiation based on concurrent zero-knowledge for e- business applications [ C]//Proceedings of IEEE International Con- ference on e-business Engineering. Washington, DC: IEEE Com- puter Society, 2008:481 -486. 被引量:1

二级参考文献58

  • 1张荣清,李建欣,怀进鹏.网格计算环境中的安全信任协商系统[J].北京航空航天大学学报,2006,32(3):347-351. 被引量:4
  • 2廖振松,金海,李赤松,邹德清.自动信任协商及其发展趋势[J].软件学报,2006,17(9):1933-1948. 被引量:52
  • 3羌卫中,邹德清,金海.网格环境中证书和策略的隐私保护机制研究[J].计算机研究与发展,2007,44(1):11-19. 被引量:11
  • 4Yu T and Winslett M. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. on Information and System Security, 2003, 6(1): 1-42. 被引量:1
  • 5Holt J, Bradshaw R, Seamons K E, and Orman H. Hidden credentials. In Proc. of the 2003 ACM Workshop on Privacy in the Electronic Society, Washington, DC, USA. ACM Press, 2003: 1-8. 被引量:1
  • 6Li Jiangtao and Li Ninghui. OACerts: Oblivious attribute certificates. In ACNS 2005, 2005, LNCS 3531: 301-317. 被引量:1
  • 7Kang B G, Park J H, and Hahn S G. A certificate-based signature scheme. In CR-RSA '04, LNCS,2004, Vol. 2964: 99-111. 被引量:1
  • 8Holt J and Seamons E. Selective disclosure credential sets. Cryptology ePrint archive: report 2002/151. 被引量:1
  • 9Smart N. Access control using pairing based cryptography. In Proceedings CT-RSA03, 2003, LNCS 2612: 111-121. 被引量:1
  • 10Boneh D and Franklin M. Identity-based encryption from the Well pairings. Advances in Cryptology-Crypto, Springer- Verlag, 2001: 213-229. 被引量:1

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部