[1]刘风华,米军利,丁恩杰.基于离散对数的容忍入侵的代理盲签名方案[J].南京理工大学学报(自然科学版),2015,39(01):34-38.
 Liu Fenghua,Mi Junli,Ding Enjie.Intrusion-tolerant proxy blind signature scheme based on discrete logarithm[J].Journal of Nanjing University of Science and Technology,2015,39(01):34-38.
点击复制

基于离散对数的容忍入侵的代理盲签名方案
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
39卷
期数:
2015年01期
页码:
34-38
栏目:
出版日期:
2015-02-28

文章信息/Info

Title:
Intrusion-tolerant proxy blind signature scheme based on discrete logarithm
作者:
刘风华12米军利2丁恩杰1
1.中国矿业大学 信息与电气工程学院,江苏 徐州 221008; 2.徐州工程学院 数学与物理科学学院,江苏 徐州 221111
Author(s):
Liu Fenghua12Mi Junli2Ding Enjie1
1.School of Information and Electrical Engineering,China University of Mining and Technology, Xuzhou 221008,China; 2.School of Mathematics and Physical Science,Xuzhou Institute of Technology,Xuzhou 221111,China
关键词:
离散对数 容忍入侵 可撤销匿名性 基于身份 私钥保护 代理盲签名
Keywords:
discrete logarithm intrusion tolerance anonymity-revoking identity-based securing private keys proxy blind signature
分类号:
TP309
摘要:
为了防御代理盲签名方案中原始签名者的伪造攻击和签名接收者的伪造攻击,该文对签名算法进行了研究。该文基于新的(t,n)秘密共享机制将证书授权中心(Certificate authority,CA)私钥进行分存,使用其身份作为私钥份额的标识,提供私钥保护的容侵性。该方案不是从保护系统或检测入侵出发来保证CA的安全,而是确保当少数部件被攻击或占领后,CA系统的机密信息并没有暴露。研究结果表明:系统中即使一定数量的用户被恶意攻击者攻击后,系统仍可有效地运转。
Abstract:
To defend the forgery attacks of the original signer and signature receiver in the scheme of proxy blind signature,this paper studies the problem of the signature algorithm.Based on the new(t,n)secret sharing mechanism,the private key of the Certificate Authority(CA)is separately stored by using its identity as the mark of private key so that it can provide the intrusion tolerance for the securing Private Keys.Rather than preventing intrusions or attacks to ensure safety of CA,the project ensures that the confidential information of the CA system will not be exposed when a minority of components are attacked.The research results show that even if certain users are spitefully attacked,the system still works properly.

参考文献/References:

[1] Chaum D,van Heyst E.Group signatures[A].Advan-ces in Cryptology Eurocrypt[C].Berlin:Springer,1991:257-265.
[2]Camenisch J,Stadler M.Efficient group signature schemes for large groups[A].Advances in Cryptology[C].Berlin:Springer,1997:410-424.
[3]Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[A].Advances in Cryptology[C].Berlin:Springer,1996:1338-1354.
[4]Bresson E,Stern J.Efficient revocation in group signatures[A].Proceedings of the Public Key Crypto-graphy[C].Cheju Island,Korea:Springer,2001:190-206.
[5]Tan Zuowen,Liu Zhuojun,Tang Chunming.A proxy blind signature scheme based on the discrete logarithm problem[J].Journal of Software,2003,14(11):1931-1935.
[6]Wang Shuhong,Wang Guilin,Bao Feng,et al.Cryptanalysis of a proxy blind signature scheme based on the discrete logarithm problem[J].Journal of Software,2005,16(5):911-915.
[7]夏满民,谷利泽.一种新型的代理盲签名方案[J].北京邮电大学学报,2006,29(3):48-52.
Xia Manmin,Gu Lize.A new proxy blind signature scheme[J].Journal of Beijing University of Posts and Telecommunications,2006,29(3):48-52.
[8]张瑛瑛,陈玮,曾吉文.对一个基于离散对数代理盲签名方案的分析与改进[J].计算机应用研究,2013,30(11):3390-3392.
Zhang Yingying,Chen Wei,Zeng Jiwen.Analysis and improvement of proxy blind signature scheme based on DLP[J].Application Research of Computers,2013,30(11):3390-3392.
[9]张有东,江波,王建东.基于入侵容忍的网络取证系统设计[J].计算机工程,2007,33(19):161-163.
Zhang Youdong,Jiang Bo,Wang Jiandong.Design of network forensic system based on intrusion tolerance[J].Computer Engineering,2007,33(19):161-163.
[10]许春根,张傲红,韩牟,等.一种基于离散对数问题的无证书代理签名方案[J].南京理工大学学报,2010,34(6):733-737.
Xu Chungen,Zhang Aohong,Han Mu,et al.Certificateless proxy signature scheme based on discrete logarithm problem[J].Journal of Nanjing University of Science and Technology,2010,34(6):733-737.
[11]柴争义,白浩,张浩军.一种CA私钥的容侵保护机制[J].计算机应用,2008,28(4):910-911.
Chai Zhengyi,Bai Hao,Zhang Haojun.An intrusion tolerant protection scheme of CA private key[J].Journal of Computer Applications,2008,28(4):910-911.
[12]何滨,杜伟章.前向安全无证书代理盲签名方案的分析与改进[J].计算机工程与应用,2013,49(22):104-109.
He Bin,Du Weizhang.Analysis and improvement of forward secure certificateless proxy blind signature scheme[J].Computer Engineering and Applications,2013,49(22):104-109.
[13]吴克力,朱保平,吴斌,等.一个匿名评审协议[J].南京理工大学学报,2007,31(4):414-417.
Wu Keli,Zhu Baoping,Wu Bin,et al.Anoymous appraisal protocol[J].Journal of Nanjing University of Science and Technology,2007,31(4):414-417.
[14]俞波,陈建平,顾翔.一种基于数字签名的实用电子投票系统[J].计算机工程与科学,2012,34(5):40-44.
Yu Bo,Chen Jianping,Gu Xiang.A practical electronic voting system based on digital signature[J].Computer Engineering & Science,2012,34(5):40-44.
[15]刘方斌,刘凤玉,张宏.基于零知识证明的低能耗Ad Hoc网络匿名路由协议[J].南京理工大学学报,2012,36(5):879-885.
Liu Fangbin,Liu Fengyu,Zhang Hong.Energy efficient anonymous routing protocol for Ad Hoc network based on zero knowledge proofs[J].Journal of Nanjing University of Science and Technology,2012,36(5):879-885.

备注/Memo

备注/Memo:
收稿日期:2014-05-18 修回日期:2014-11-10
基金项目:国家自然科学基金(31270577)
作者简介:刘风华(1976-),女,博士生,主要研究方向:信息安全、数据挖掘技术,E-mail:liufenghua@xzit.edu.cn。
引文格式:刘风华,米军利,丁恩杰.基于离散对数的容忍入侵的代理盲签名方案[J].南京理工大学学报,2015,39(1):34-38.
投稿网址:http://zrxuebao.njust.edu.cn
更新日期/Last Update: 2015-02-28