浏览全部资源
扫码关注微信
1. 西南交通大学 信息科学与技术学院,四川 成都 610031
2. 西南交通大学 信息安全与国家计算网格实验室,四川 成都 610031
[ "陈桢(1990-),男,福建福州人,西南交通大学硕士生,主要研究方向为面向云计算的签名、认证加密机制等。" ]
[ "张文芳(1978-),女,山西太原人,博士,西南交通大学副教授、硕士生导师,主要研究方向为公钥密码学、信息安全等。" ]
[ "王小敏(1974-),男,江西萍乡人,博士,西南交通大学教授、博士生导师,主要研究方向为信息安全、轨道交通安全工程等。" ]
网络出版日期:2015-12,
纸质出版日期:2015-12-25
移动端阅览
陈桢, 张文芳, 王小敏. 基于属性的抗合谋攻击可变门限环签名方案[J]. 通信学报, 2015,36(12):212-222.
Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG. Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity[J]. Journal on communications, 2015, 36(12): 212-222.
陈桢, 张文芳, 王小敏. 基于属性的抗合谋攻击可变门限环签名方案[J]. 通信学报, 2015,36(12):212-222. DOI: 10.11959/j.issn.1000-436x.2015330.
Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG. Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity[J]. Journal on communications, 2015, 36(12): 212-222. DOI: 10.11959/j.issn.1000-436x.2015330.
基于属性的密码体制是基于身份密码体制的泛化和发展,它将身份扩展为一系列属性的集合,具有更强的表达性,并且拥有相同属性的成员自动组成一个环,便于隐匿签名者身份。通过对现有的基于属性门限环签名方案的深入分析,发现这些方案虽然满足匿名性要求,但拥有互补属性的恶意用户可以通过合谋伪造出有效签名。为弥补上述缺陷,首先给出基于属性门限环签名的不可伪造性、不可区分性及抗合谋攻击性的形式化定义,然后给出一个基于属性的抗合谋攻击可变门限环签名方案,其安全性可归约为 CDH(computational Diffie-Hellman)困难问题。所提方案通过在用户属性密钥中引入互不相同的秘密随机因子的方法,防止合谋攻击者利用组合私钥的方式伪造签名。在随机预言机模型下,方案被证明能够抵抗适应性选择消息的存在性伪造及合谋攻击,并具有相同签名属性集用户间的不可区分性。与同类方案相比,新方案还具备更高的运算效率。
Attribute-based cryptography is a generalization and development of the identity-based cryptography
which extends the identity to a set of attributes.In the attribute-based cryptosystem
different members with the same attributes can form a signature ring automatically
with the actual signer’s personl idnetity easily hided.By in-depth analysis of several attribute-based threshold ring signature schemes proposed by the earlier reseachers
it is concluded that the malicious users with the complementary attributes can conspire to forge a valid signature.In order to compensate for the defect
the proposal first gives the formal definitions of the security characteristics in attribute-based threshold ring signature scheme
such as unforgeability
indistinguishability and anti-collusion attack.Then a new attribute-based alterable threshold ring signature scheme is presented
whose security is proven equivalent to the computational Diffie-Hellman problem.By introducing an random secret parameter in each user’s private key
the proposal can resist the collusion attacks.It is proven that the proposal can satisfy existential unforgeability and anti-collusion against the adaptive chosen message attack in therandom oracle model
and can meet the requirement of indistinguishability among the users with the same attributes.Besides
property analysis shows that the proposal has high efficiency.
SHAMIR A . Identity-based cryptosystems and signatures schemes [A ] . Proc of the CRYPTO 1984 [C ] . Heidelberg : Springer-Verlag , 1985 . 47 - 53 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [A ] . Proc of the Eurocrypt 2005 [C ] . Heidelberg : Springer-Verlag , 2005 . 457 - 473 .
GOYAL V , PANDEY O , et al . Attribute-based encryption for fine-grained access control of encryption data [A ] . Proc of the 13th ACM CCS [C ] . New York , 2006 . 89 - 98 .
ATTRAPADUNG N , IMAI H . Dual-policy attribute based encryption [A ] . Proc of the ACNS’09 [C ] . Heidelberg : Springer-Verlag , 2009 . 168 - 185 .
李强 , 冯登国 , 张立武 , 等 . 标准模型下增强的基于属性的认证密钥协商协议 [J ] . 计算机学报 , 2013 , 36 ( 10 ): 2156 - 2167 .
LI Q , FENG D G , ZHANG L W , et al . Enhanced attribute-based au-thenticated key agreement protocol in the standard model [J ] . Chinese Journal of Computers , 2013 , 36 ( 10 ): 2156 - 2167 .
熊金波 , 姚志强 , 马建峰 , 等 . 基于属性加密的组合文档安全自毁方案 [J ] . 电子学报 , 2014 , 42 ( 2 ): 366 - 376 .
XIONG J B , YAO Z Q , MA J F , et al . A secure self-destruction scheme for composite documents with attribute based encryption [J ] . Acta Electronica Sinica , 2014 , 42 ( 2 ): 366 - 376 .
魏江宏 , 刘文芬 , 胡学先 . 前向安全的密文策略基于属性加密方案 [J ] . 通信学报 , 2014 , 35 ( 7 ): 38 - 45 .
WEI J H , LIU W F , HU X X . Forward-secure ciphertext-policy attrib-ute-based encryption scheme [J ] . Journal on Communications , 2014 , 35 ( 7 ): 38 - 45 .
YANG P , CAO Z , Dong X . Fuzzy identity based signature with applications to biometric authentication [J ] . Compute and Electrical Engineering , 2011 ,( 37 ): 532 - 540 .
KHADER D . Attribute based group signatures [EB/OL ] . http://eprint.iacr.org/2007/159 http://eprint.iacr.org/2007/159 . 2007 .
KHADER D . Attribute based group signature with revocation [EB/OL ] . http://eprint.iacr.org/2007/241 http://eprint.iacr.org/2007/241 .
GUO S , ZENG Y . Attribute-based signature scheme [A ] . Proc of the ISA 2008 [C ] . Busan , 2008 . 509 - 511 .
MAJI H , PRABHAKARAN M , ROSULEK M . Attribute-based signatures [A ] . Proc of the CT-RSA 2011 [C ] . Heidelberg : Springer-Verlag , 2011 . 376 - 392 .
RIVEST R L , SHAMIR A , TAUMAN Y . How to leak a secret [A ] . Proc of the Asiacrypt 2001 [C ] . Heidelberg : Springer-Verlag , 2001 . 552 - 565 .
CHAUM D , HEYST E V . Group signatures [A ] . Proc of the Eurocrypt 1991 [C ] . Heidelberg : Springer-Verlag , 1991 . 257 - 265 .
LI J , KIM K . Hidden attribute-based signatures without anonymity revocation [J ] . Information Sciences , 2010 , 180 : 1681 - 1689 .
SHAHANDASHTI S F,SAFAVI-NAINI R . Threshold attribute-based signatures and their application to anonymous credential systems [A ] . Proc of the Africacrypt 2009 [C ] . Heidelberg : Springer-Verlag , 2009 . 198 - 216 .
LI J , AU M H , SUSILO W , et al . Attribute-based signatures and its applications [A ] . Proc of the 5th ACM ASIACCS [C ] . 2010 . 978 - 987 .
WANG W Q , CHEN S Z . An Efficient attribute-based ring signature scheme [A ] . Proc of the 2009 International Forum on Computer Science-Technology and Applications [C ] . 2009 . 147 - 150 .
WANG W Q , CHEN S Z . Attribute-based ring signature scheme with constant-size signature [J ] . IET Information Security , 2010 , 4 ( 2 ): 104 - 110 .
TOLUEE R , ASAAR M R , SALMASIZADEH M . Attribute-based ring signatures:security analysis and a new construction [A ] . Proc of the 10th ISCISC [C ] . 2013 . 1 - 6 .
付小晶 , 张国印 , 马春光 . 一个改进的动态门限基于属性签名方案 [J ] . 计算机科学 , 2013 , 40 ( 7 ): 93 - 97 .
FU X J , ZHANG G Y , MA C G . Dynamic threshold attributes-based signature scheme [J ] . Computer Science , 2013 , 40 ( 7 ): 93 - 97 .
张秋璞 , 徐震 , 叶顶峰 . 一个可追踪身份的基于属性签名方案 [J ] . 软件学报 , 2012 , 23 ( 9 ): 2449 - 2464 .
ZHANG Q P , XU Z , YE D F . Identity traceable attribute-based signa-ture scheme [J ] . Journal of Software , 2012 , 23 ( 9 ): 2449 - 2464 .
ESCALA A , HERRANZ J , MORILLO P . Revocable attribute-based signatures with adaptive security in the standard model [A ] . Proc of the Africacrypt 2011 [C ] . Heidelberg : Springer-Verlag , 2011 . 224 - 241 .
陈少真 , 王文强 , 彭书娟 . 高效的基于属性的环签名方案 [J ] . 计算机研究与发展 , 2010 , 47 ( 12 ): 2075 - 2082 .
CHEN S Z , WANG W Q , PENG S J . Efficient attribute-based ring signature schemes [J ] . Journal of Computer Research and Development , 2010 , 47 ( 12 ): 2075 - 2082 .
0
浏览量
850
下载量
5
CSCD
关联资源
相关文章
相关作者
相关机构