期刊文献+

属性基门限签名方案及其安全性研究 被引量:4

Threshold Attribute-Based Signature and Its Security
下载PDF
导出
摘要 属性基门限签名方案要求用户的身份用一系列的属性来描述,签名者的权力由其所拥有的属性集合决定.验证者通过验证该签名,只能确定该签名者属性集与验签属性集合相同的属性数目超过门限值个,具有保护属性隐私的作用.本文分析了Li等人的灵活门限签名方案,发现其存在签名伪造的安全问题.针对该方案安全性方面的不足,本文设计了一个安全可证的属性基门限签名方案,并基于CDH困难假设,在标准模型下证明了该签名算法的安全性. A threshold attribute-based signature(t-ABS) scheme defines each signer with a set of attributes,which determine signature ability for each signer.In a t-ABS,signature holder prove possession of signatures by revealing only a threshold number of attributes in common with the verification attribute set,hence providing signer-attribute privacy for the signers.In this paper,we analyze a flexiblethreshold ABS proposed by Li et al and demonstrate its vulnerability to forgeable attacks.Finally,we introduce a t-ABS scheme,which is proved to be secure in the standard model based on CDH problem.
出处 《电子学报》 EI CAS CSCD 北大核心 2013年第5期1012-1015,共4页 Acta Electronica Sinica
基金 国家自然科学基金(No.61170241) 黑龙江省自然科学面上项目(No.F201229) 网络与数据安全四川省重点实验室开放课题基金 哈尔滨市科技创新人才研究专项资金(No.2012RFXXG086)
关键词 属性基门限签名方案 安全性 标准模型 threshold attribute-based signature security standard model
  • 相关文献

参考文献11

  • 1Sahai A,Waters B.Fuzzy identity-based encryption[A].Advances in Cryptology-EUROCRYPT 2005[C].Berlin:Springer,2005.557-557. 被引量:1
  • 2Maji H,Prabhakaran M,Rosulek M.Attribute-based signatures:Achieving attribute-privacy and collusion-resistance[DB/OL].http://www.iacr.org/ayptodb/data/paper.php,2008-03-28. 被引量:1
  • 3Shaniqng G,Yingpei Z.Attribute-based signature scheme[A].International Conference on Information Security and Assurance,ISA 2008[C].USA:IEEE,2008.509-511. 被引量:1
  • 4Yang P,Cao Z,Dong X.Fuzzy identity based signature[DB/OL].http://eprint.iacr.org/2008/002.pdf,2008-01-01. 被引量:1
  • 5Li J,Kim K.Atttibute-based ring signatures[DB/OL].http://eprint.iacr.org/2008/394.html,2011-12-20. 被引量:1
  • 6Chaum D,Van Heyst E.Group signatures[A].Advances in Cryptology-EUROCRYPT' 91[C].Berlin:Springer,1991.257. 被引量:1
  • 7Rivest R,Shamir A,Tauman Y.How to leak a secret[A].Advances in Crrpology-ASIACRYPT 2001[C].Berlin:Springer,2001.552-565. 被引量:1
  • 8Khader D.Attribute based group signature with revocation[DB/OL].http://eprint.iaer.org/2007/241.html,2009-03-12. 被引量:1
  • 9Shahandashti S,Safavi-Naini R.Threshold attribute-based sig[A].Progress in Cryptology-AFRICACRYPT 2009[C].Berlin:Springer,2009.198-216. 被引量:1
  • 10Li J,Au M H,Susilo W,Xie D,Ren K.Attribute-based signature and its applications[A].ASIACCS' 10 Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security[C].New York:ACM,2010.60-69. 被引量:1

二级参考文献10

  • 1庞辽军,柳毅,王育民.一个有效的(t,n)门限多重秘密共享体制[J].电子学报,2006,34(4):587-589. 被引量:26
  • 2Desmedt Y, Frankel Y. Shared generation of authenticators and signatures[A]. Proc of Advances in Cryptology Crypto'91 [C]. Santa Barbara, California, USA, 1991.457 - 469. 被引量:1
  • 3Rivest RL,Shamir A,Adleman L.A method for obtaining digital signatures and public key cryptosystems [ J ]. Commun. ACM, 1978,21(2) : 120 - 126. 被引量:1
  • 4Lee N Y. Threshold signature scheme with multiple signing policies[ J ]. IEE Proc-Comput Digit Tech, 2001,148 (2) : 95 - 99. 被引量:1
  • 5Chang T Y, Yang C C, Hwang M S. A threshold signature scheme for group communications without a shared distribution center[ J ]. Future Generation Computer Systems, 2004,20 (6) : 1013- 1021. 被引量:1
  • 6Chan C W, Chang C C. A scheme for threshold multi-secret sharing[ J ]. Applied Mathematics and Computation, 2005, 166 (1):1 - 14. 被引量:1
  • 7Li H X, Cheng C T, Pang L J. A New ( t, n)-threshold multisecret sharing scheme [ A ]. Proc of Computational Intelligence and Security CIS'05[C]. Xi'an,China,2005,421 - 426. 被引量:1
  • 8Agnew G B, Mullin R C, Vanstone S A. Improved digital signature scheme based on discrete exponentiation [ J ]. Electronics Letters, 1990,26(14) : 1024 - 1025. 被引量:1
  • 9Zheng Y, Matsumoto T, Imai H. Structural properties of one- way hash function [ A ]. Proc of Advances in Ctyptology Crypto'90 [C]. Santa Barbara, California, USA, 1990. 285 - 302. 被引量:1
  • 10Shamir A.How to share a secret[ J]. Commun. ACM, 1979,22 (11) :612 - 613. 被引量:1

共引文献6

同被引文献28

引证文献4

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部