期刊文献+

可证明安全的无中心授权的多授权属性签名 被引量:4

Provable Secure Multi-Authority Attribute-Based Signature without a Central Authority
下载PDF
导出
摘要 设计了无需中心授权机构的多授权签名方案,将用户的多个属性由不同的授权机构分别管理。与往常的多授权机构密码体制不同,不需要一个可信的中心授权机构来管理和约束多个授权机构,而是可信授权机构的数量达到一定值就能保证整个系统的安全性,提高了系统的实用性。采用归约的可安全证明方法证明该方案的安全性归约为计算Diffie-Hellman难题、分布式密钥生成协议(DKG)和联合的零秘密共享协议(JZSS)的安全性,从而说明该方案有存在性、不可伪造和抗合谋攻击的安全特性。 In attribute-based cryptosystem, many attributes of a user were monitored by a single authority, which would inevitably increase its workload and reduce its efficiency. In this paper, a multi-authority signature scheme without a central authority is proposed. In this scheme, many attributes of a user are monitored by many different authorities respectively, in stead of a trusted central authority. The scheme increases the system's applicability. The security of this scheme is proved equal to computational Diffie-Hellman (CDH) problem. So the scheme has two characteristics of existential unforgeability and security preventing collusion attack.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2012年第4期552-556,共5页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(61072140) 高等学校创新引智计划(B08038)
关键词 基于属性 CDH难题 中心授权机构 合谋攻击 多授权机构 attribute-based CDH/problem central authority collusion attack multi-authority
  • 相关文献

参考文献14

  • 1SAHAI A, WATERS B. Fuzzy identity=based ncryption[C] //Advancos in Cryptology=EUROCRYPT, 2005. Aarhus: Springcr=Verlag) 2005. 被引量:1
  • 2GOYAL V, PANDEY O, SAHAI A, ct al. Attribut-basod encryption for fine, grained access control of cnctypt data[C]//Proc of CCS. New York, USA: ACM Press, 2006. 被引量:1
  • 3GUO S, ZENG Y. Attribute-based signature scheme[C]// Conference of Information Security and Assurance (ISA2008). Xi'an: Xidian University Press, 2008. 被引量:1
  • 4SHAHANDASHTI S F, SAFAVI-NAINI R. Threshold attribute-based signatures and their application to anonymous credential systems[C]//AFRICACRPT'2009. Berlin: Springer-Verlag, 2009. 被引量:1
  • 5MAJI H, PRABHAKARAN M, ROSULEK M. Attribute-based signatures: Achieving attribute-privacy and collusion-resistance[R/OL]. [2008-05-II]. Cryptology Print Archive, Report 2008/328. http://eprint.iacr.org/2008/328. 被引量:1
  • 6KHADER D. Attribute based group signaturcs[R/OL]. [2007-10-20]. Cryptology Print Archive, Report 2007/159. http://cprint.iacr.org12007/159. 被引量:1
  • 7LI J, KIM K. Attributc-basexi ring signaturcs[R/OL]. [2008=03-26]. Cryptology ePrint Archive, Report 2008/394. http://eprint.iacr.org/2008/394. 被引量:1
  • 8YAN(3 P, CAO Z, DONG X. Fuzzy identity based signature. [R/OL]. [2008-03-26]. Cryptology cPrint Archive, Report 2008/002. http://eprint.iacr.org/2008/002. 被引量:1
  • 9CHASE M. Multi=authority attribute based cncryption[C]// Leure Notes in Computer Science of TCC. [S,l.]: Springer- Vcrlag, 2007. 被引量:1
  • 10LIN H, CAO Z, LIANG X, et al. Secure threshold multi authority attribute based encryption without a central authority[J]. Information Sciences, 2010, 180: 2618-2632. 被引量:1

二级参考文献11

  • 1Sahai A, Waters B. Fuzzy identity-based encryption [ C ]// Advances in Cryptology-EUROCRYPT 2005. LNCS 3494, Aarhus : Springer-Verlag Press,2005:457 - 473. 被引量:1
  • 2Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [ C ]//Proceedings of the 28^th IEEE Symposium on Security and Privacy. Oakland,2007:321 - 334. 被引量:1
  • 3Cheung L, Newport C. Provably secure ciphertext policy ABE [ C ]//ACM Conference on Computer and Communications Security (ACMCCS). 2007. 被引量:1
  • 4Pirretti M, Traynor P, McDaniel P, et al. based systems [ C ]//13^th ACM Conference Secure atrributeon Computer and Communications Security (ACM CCS). Alexandria Virginia, USA, 2006 : 99 - 112. 被引量:1
  • 5Ostrovsky R, Sahai A, Waters B. Attribute based encryption with non-monotonic access structures [ C ]//ACM Conference on Computer and Communicardons Security (ACM CCS). 2007. 被引量:1
  • 6Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [ C ]// Proc of CCS. New York : ACM Press, 2006 : 89 - 98. 被引量:1
  • 7Yang P, Cao Z, Dong X. Fuzzy identity based signature[ R] Cryptology ePrint Archive, Report 2008/002, http ://eprint iaer. org/2008/002,2007. 被引量:1
  • 8Guo S, Zeng Y. Attribute-based signature scheme [ C ]//International Conference Information Security and Assurance ( ISA 2008 ). 2008:509 - 511. 被引量:1
  • 9Shahandashti S F, Safavi-Naini R. Threshold attribute-based signatures and their application to anonymous credential systems [ C ]//AFRICACRYPT 2009. LNCS 5580, Berlin: Springer-Verlag,2009 : 198 - 216. 被引量:1
  • 10Chase M. Multi-authority attribute based encryption [ C ]// Vadhan S P. Lecture Notes in Computer Science TCC Springer, 2007:515 - 534. 被引量:1

共引文献7

同被引文献25

  • 1Sabai A, Waters B. Fuzzy identity-based encryption [ A]. Pro- ceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques [ C ]. Berlin Heidelberg: Springer,2005.457 - 473. 被引量:1
  • 2Goyal Pandey O, Sabai A, et al. Attribute based encryption for" fine-grained access control of encrypted data [ A]. Proceedings of ACM Conference on Computer and Communications Securi- ty [ C] .Alexandria, Virginia, USA: ACM,2006.89 - 98. 被引量:1
  • 3Bethencourt J, Sahai A, Waters B. Ciphertext-policy aUribute- based encryption [ A]. IEEE Symposium on Security and Priva- cy( SP' 07) [ C ]. Berkeley, California, USA: IEEE, 2007.321 - 334. 被引量:1
  • 4Melissa Chase. Multi-authorityattribute based encryption [ A ]. Proceedings of the 4th Theory of Cryptography Conference L C]. Berlin Heidelberg: Springer, 2007.515 - 534. 被引量:1
  • 5Wang G, Liu Q, Wu J. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services E A]. Proceedings of ACM CCS Computer and Communications Se- curity [C].New York,USA:ACM,2010.735- 737. 被引量:1
  • 6Bobba R, Khurana H, Prabhakaran M. Attribute-sets: A practi- cally motivated enhancement to auribute-based encryption [ A ]. Proceedings of ESORICS [ C ]. Berlin Heidelberg: Springer, 2009.587 - 604. 被引量:1
  • 7Li Ming, Yu Shu-cheng,Zlaeng Yao. Scalable andsecure shar- ing of personal health records in cloud computing using at- tribute-based encryption [ J ]. IEEE. Transactions on Parallel and Distributed System,2012,24( 1 ) : 131 - 143. 被引量:1
  • 8MellP.GranceT.800-145.The NIST definition of cloud computing[S].Gaithersburg,USA;National Institute of Standards and Technology,2009. 被引量:1
  • 9BETHENCOURT S A,WATERS B.Ciphertext-policy attributebased encryption[C].IEEE Symposium on Security and Privacy(SP'07),Oakland,USA:IEEE Computer Society,2007:321-334. 被引量:1
  • 10SAHAI A,WATERS B.Fuzzy identity based encryption[J].Lecture Notes in Computer Science,2005,3494:457-473. 被引量:1

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部