期刊文献+

基于代理重签名的电子政务数据安全交换方案 被引量:5

E-government Data Security Exchange Scheme Based on Proxy Re-signature
下载PDF
导出
摘要 针对电子政务数据交换的安全问题,基于离散对数设计一个双陷门哈希函数,并证明新函数满足有效性、陷门碰撞、抗碰撞和抗密钥泄露等性质。结合该陷门哈希函数和代理重签名方案,提出一种新的电子政务数据安全交换方案,并证明新方案的安全性可归约到所基于的代理重签名方案和陷门哈希函数的安全性。分析结果表明,新方案的重签名生成和验证开销小,数据交换实时性高,存储空间小,适用于计算资源有限的设备。 Considering the security problem of e-government data exchange,a double trapdoor Hash function is proposed by using discrete logarithm assumption.Moreover,this function is proved to satisfy the properties,such as validity,trapdoor collision,collision resistance,key compromise resistance and so on.Combining the proposed Hash function with existing proxy re-signature schemes,a new secure e-government data exchange scheme is presented,and the security of this scheme can be reduced to the security of the trapdoor Hash function and the underlying proxy re-signature scheme.Analysis results show that the proposed scheme can effectively reduce the cost of re-signature generation and resignature verification,enhance real-time data exchange,and reduce storage space.Therefore,the proposed scheme is suitable for devices with limited computing resources.
出处 《计算机工程》 CAS CSCD 北大核心 2017年第2期183-188,共6页 Computer Engineering
基金 国家自然科学基金(61662069 61262057) 甘肃省科技计划项目(145RJDA325) 国家档案局科技计划项目(2014-X-33) 甘肃省高等学校科研项目(2014-A011) 兰州市科技计划项目(2013-4-22) 西北师范大学青年教师科研能力提升计划项目(NWNU-LKQN-14-7)
关键词 电子政务 数据交换 双陷门哈希函数 代理重签名 离散对数 e-government data exchange double trapdoor Hash function proxy re-signature discrete logarithm
  • 相关文献

参考文献4

二级参考文献26

  • 1许峰,赖海光,黄皓,谢立.面向服务的角色访问控制技术研究[J].计算机学报,2005,28(4):686-693. 被引量:56
  • 2朱一群,李建华,张全海.一种面向Web服务的动态分级角色访问控制模型[J].上海交通大学学报,2007,41(5):783-787. 被引量:14
  • 3Park J,Sandhu R.The UCONABC Usage Control Model [J].ACM Transactions on Information and System Security,2004,7(1):128-174. 被引量:1
  • 4Sandhu R.Role-based Access Control Models[J].IEEE Computer,1996,29(2):38-47. 被引量:1
  • 5Ateniese G,Hohenberger S.Proxy Re-signatures: New Definitions,Algorithms,and Applications [C]//Proceedings of ACM CCS’05.Alexandria,USA:ACM Press,2005:310-319. 被引量:1
  • 6Shao Jun,Cao Zhenfu,Wang Licheng,et al.Proxy Resignature Schemes Without Random Oracles [C]// Proceedings of INDO-CRYPT’07.Chennai,India:[s.n.],2007:197-209. 被引量:1
  • 7Kiate K,Ikkwon Y,Secogan L.Remark on Shao et al’s Bidirectional Proxy Re-signature Scheme in Indocrypt’07[J].International Journal of Network Security,2009,8(3):308-311. 被引量:1
  • 8Benoit L,Damien V.Multi-use Unidirectional Proxy Resignatures[C]// Proceedings of the 15th ACM Conference on Computer and Communications Security.Alexandria,USA:ACM Press,2008:511-520. 被引量:1
  • 9Buchmann J,Dahmen E,Ereth S,et al.On the Security of the Winternitz One-time Signature Scheme [J].International Journal of Applied Cryptography,2013,3(1):84-96. 被引量:1
  • 10Waters B.Efficient Identity-based Encryption Without Random Oracles [C]//Proceedings of EuroCrypt’05.Aarhus,Danmark:[s.n.],2005:114-127. 被引量:1

共引文献14

同被引文献62

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部