您的位置: 专家智库 > >

国家自然科学基金(60903189)

作品数:8 被引量:20H指数:3
相关作者:陈克非徐贤龙宇更多>>
相关机构:信息安全国家重点实验室上海交通大学华东理工大学更多>>
发文基金:国家自然科学基金国家重点基础研究发展计划国家高技术研究发展计划更多>>
相关领域:自动化与计算机技术理学电子电信更多>>

文献类型

  • 7篇中文期刊文章

领域

  • 7篇自动化与计算...
  • 1篇电子电信

主题

  • 2篇THRESH...
  • 2篇IDENTI...
  • 2篇KEY-IN...
  • 2篇SIGNAT...
  • 1篇信任
  • 1篇用户
  • 1篇私人密钥
  • 1篇随机预言模型
  • 1篇签名
  • 1篇签名方案
  • 1篇零知识
  • 1篇零知识证明
  • 1篇门限
  • 1篇门限密码
  • 1篇门限密码体制
  • 1篇密码
  • 1篇密码体制
  • 1篇密钥绝缘
  • 1篇密钥托管
  • 1篇可证安全

机构

  • 1篇华东理工大学
  • 1篇上海交通大学
  • 1篇信息安全国家...

作者

  • 1篇龙宇
  • 1篇徐贤
  • 1篇陈克非

传媒

  • 4篇Journa...
  • 2篇High T...
  • 1篇计算机研究与...

年份

  • 2篇2014
  • 1篇2013
  • 2篇2012
  • 2篇2011
8 条 记 录,以下是 1-7
排序方式:
An Efficient Threshold Key-Insulated Signature Scheme
2011年
To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS scheme.For a TKIS system,at least k out of n helpers are needed to update a user's temporary private key.On the one hand,even if up to k 1 helpers are compromised in addition to the exposure of any of temporary private keys,security of the non-exposed periods is still assured.On the other hand,even if all the n helpers are compromised,we can still ensure the security of all periods as long as none of temporary private keys is exposed.Compared with traditional key-insulated signature(KIS) schemes,the proposed TKIS scheme not only greatly enhances the security of the system,but also provides flexibility and efficiency.
陈剑洪龙宇陈克非王永涛李祥学
关键词:SIGNATURE
Identity-based threshold key-insulated signature被引量:3
2012年
Chen JianhongChen KefeiLong Yu
关键词:密钥绝缘随机预言模型私人密钥签名方案
Attribute-Based Signature on Lattices被引量:2
2014年
Attribute-based signature is a versatile class of digital signatures. In attribute-based signature, a signer obtains his private key corresponding to the set of his attributes from a trusted authority, and then he can sign a message with any predicate that is satisfied by his attributes set. Unfortunately, there does not exist an attributebased signature which is resistance to the quantum attacks. This means we do not have secure attribute-based signature schemes in a post-quantum world. Based on this consideration, an attribute-based signature on lattices,which could resist quantum attacks, is proposed. This scheme employs "bonsai tree" techniques, and could be proved secure under the hardness assumption of small integer solution problem.
毛贤平陈克非龙宇王亮亮
关键词:LATTICE
New Constructions of Dynamic Threshold Cryptosystem被引量:4
2014年
This study deals with the dynamic property of threshold cryptosystem. A dynamic threshold cryptosystem allows the sender to choose the authorized decryption group and the threshold value for each message dynamically. We first introduce an identity based dynamic threshold cryptosystem, and then use the CanettiHalevi-Katz(CHK) transformation to transform it into a fully secure system in the traditional public key setting.Finally, the elegant dual system encryption technique is applied to constructing a fully secure dynamic threshold cryptosystem with adaptive security.
龙宇陈克非毛贤平
Identity-Based Key-Insulated Proxy Signature Without Random Oracles
2011年
In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are kept perfectly secure. However, due to viruses, worms or other break-ins allowed by operating-system holes, key exposure seems inevitable. To minimize the damage caused by key exposure in IBPS, we propose an identity-based key-insulated proxy signature (IBKIPS) scheme in the standard model, i.e. without random oracles.
陈剑洪龙宇陈克非王永涛
关键词:KEY-INSULATEDIDENTITY-BASED
两个降低PKG信任级的基于身份的门限密码体制被引量:4
2012年
在基于身份的公钥密码体制中PKG负责生成用户密钥,对PKG的信任级别过高,存在密钥托管问题.人们为解决此问题提出了很多方案但均有一定缺陷.Goyal提出了一种解决这类问题的新思路.基于该思路,提出了两种降低对私钥生成中心的信任级别的门限密码体制.在这两个体制中,利用了Goyal提出的基于身份的可追踪公钥加密体制的思想与公开可验证加密技术,有效解决了在基于身份的门限加密体制中,PKG对同一用户恶意生成多个私钥的追踪问题.对降低PKG信任级的基于身份的门限密码体制进行了形式化定义,并在所定义的形式化安全模型下证明了这两个方案可以对抗门限自适应选择密文攻击、密钥寻找攻击以及计算新密钥攻击.
龙宇徐贤陈克非
关键词:门限密码体制可证安全零知识证明
Towards accountable authority attribute-based encryption被引量:1
2013年
An accountable authority attribute-based encryption(A-ABE)scheme is presented in this paper.The notion of accountable authority identity-based encryption(A-IBE)was first introduced by Goyal at Crypto'07.It is a novel approach to mitigate the(inherent)key escrow problem in identity-based cryptosystems.In this work,the concept of accountable authority to attribute-based encryption(ABE)setting is generalized for the first time,and then a construction is given.The scheme non-trivially integrates an A-IBE scheme proposed by Libert et al.with an ABE scheme.In our construction,a user will be identified by a pair(id,ω),where id denotes the user's identity andωdenotes the set of attributes associated to the user.In addition,our construction is shown to be secure under some reasonable assumptions.
王永涛Chen KefeiLong Yu
关键词:加密密钥托管用户
共1页<1>
聚类工具0