您的位置: 专家智库 > >

国家自然科学基金(60903020)

作品数:8 被引量:14H指数:3
相关作者:陈克非徐贤龙宇更多>>
相关机构:信息安全国家重点实验室上海交通大学华东理工大学更多>>
发文基金:国家自然科学基金国家重点基础研究发展计划国家高技术研究发展计划更多>>
相关领域:自动化与计算机技术电子电信理学更多>>

文献类型

  • 6篇中文期刊文章

领域

  • 6篇自动化与计算...
  • 1篇电子电信

主题

  • 3篇KEY-IN...
  • 2篇THRESH...
  • 2篇IDENTI...
  • 2篇SIGNAT...
  • 1篇信任
  • 1篇零知识
  • 1篇零知识证明
  • 1篇门限
  • 1篇门限密码
  • 1篇门限密码体制
  • 1篇密码
  • 1篇密码体制
  • 1篇可证安全
  • 1篇基于身份
  • 1篇PKG
  • 1篇SIGNAT...
  • 1篇TOWARD...
  • 1篇WITHOU...
  • 1篇AUTHOR...
  • 1篇HIGHER...

机构

  • 1篇华东理工大学
  • 1篇上海交通大学
  • 1篇信息安全国家...

作者

  • 1篇龙宇
  • 1篇徐贤
  • 1篇陈克非

传媒

  • 3篇Journa...
  • 2篇High T...
  • 1篇计算机研究与...

年份

  • 2篇2013
  • 2篇2012
  • 2篇2011
8 条 记 录,以下是 1-6
排序方式:
Identity-Based Key-Insulated Proxy Signature Without Random Oracles
2011年
In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are kept perfectly secure. However, due to viruses, worms or other break-ins allowed by operating-system holes, key exposure seems inevitable. To minimize the damage caused by key exposure in IBPS, we propose an identity-based key-insulated proxy signature (IBKIPS) scheme in the standard model, i.e. without random oracles.
陈剑洪龙宇陈克非王永涛
关键词:KEY-INSULATEDIDENTITY-BASED
An Efficient Threshold Key-Insulated Signature Scheme
2011年
To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS scheme.For a TKIS system,at least k out of n helpers are needed to update a user's temporary private key.On the one hand,even if up to k 1 helpers are compromised in addition to the exposure of any of temporary private keys,security of the non-exposed periods is still assured.On the other hand,even if all the n helpers are compromised,we can still ensure the security of all periods as long as none of temporary private keys is exposed.Compared with traditional key-insulated signature(KIS) schemes,the proposed TKIS scheme not only greatly enhances the security of the system,but also provides flexibility and efficiency.
陈剑洪龙宇陈克非王永涛李祥学
关键词:SIGNATURE
Process Passing Calculus,Revisited
2013年
In the context of process calculi, higher order π calculus (A calculus) is prominent and popular due to its ability to transfer processes. Motivated by the attempt to study the process theory in an integrated way, we give a system study of A calculus with respect to the model independent framework. We show the coincidence of the context bisimulation to the absolute equality. We also build a subbisimilarity relation from A calculus to the π calculus.
尹强龙环
关键词:EXPRESSIVENESSBISIMULATION
两个降低PKG信任级的基于身份的门限密码体制被引量:4
2012年
在基于身份的公钥密码体制中PKG负责生成用户密钥,对PKG的信任级别过高,存在密钥托管问题.人们为解决此问题提出了很多方案但均有一定缺陷.Goyal提出了一种解决这类问题的新思路.基于该思路,提出了两种降低对私钥生成中心的信任级别的门限密码体制.在这两个体制中,利用了Goyal提出的基于身份的可追踪公钥加密体制的思想与公开可验证加密技术,有效解决了在基于身份的门限加密体制中,PKG对同一用户恶意生成多个私钥的追踪问题.对降低PKG信任级的基于身份的门限密码体制进行了形式化定义,并在所定义的形式化安全模型下证明了这两个方案可以对抗门限自适应选择密文攻击、密钥寻找攻击以及计算新密钥攻击.
龙宇徐贤陈克非
关键词:门限密码体制可证安全零知识证明
Towards accountable authority attribute-based encryption被引量:1
2013年
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It is a novel approach to mitigate the (inherent) key escrow problem in identity-based cryptosystems. In this work, the concept of accountable authority to attribute-based encryption (ABE) setting is generalized for the first time, and then a construction is given. The scheme non-trivially integrates an A-IBE scheme proposed by Libert et al. with an ABE scheme. In our construction, a user will be identified by a pair ( id, o~), where id denotes the user' s identity and ω denotes the set of attributes associated to the user. In addition, our construction is shown to be secure under some reasonable assumptions.
王永涛Chen KefeiLong Yu
关键词:CRYPTOGRAPHYTRACEABILITY
Identity-based threshold key-insulated signature被引量:3
2012年
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now.
Chen JianhongChen KefeiLong Yu
关键词:SIGNATURE
共1页<1>
聚类工具0