普适计算环境下高效的分布式安全性与隐私性问题研究
项目来源
项目主持人
项目受资助机构
立项年度
立项时间
项目编号
研究期限
项目级别
受资助金额
学科
学科代码
基金类别
关键词
参与者
参与机构
项目受资助省
项目结题报告(全文)
1.Efficient Self-Certified Blind Signature Scheme with Parings
- 关键词:
- self-certified cryptography; blind signature; the CDH problem; pairingoperator
- Zhang, Jian-hong;Zhen, Wei-na
- 《International Conference on Wireless Communication and Sensor Network》
- 2014年
- DEC 13-14, 2014
- Wuhan, PEOPLES R CHINA
- 会议
Blind signature is a special anonymous technique; it can realize the anonymity of the signed message. A common blind signature is achieved in PKI and ID-based cryptography. However, self-certified signature scheme is a better choice than that in traditional public key system and ID-based cryptography, since it omits key escrow problem of ID-based crypto-system and avoids complex certificate management of traditional PKI. In the work, we first formalized the security models of self-certified blind signature by classifying its adversary types. Then, we proposed a concrete instance. And we also show that the proposed scheme is provably secure in the random oracle models and the security of the scheme is closely related to a extended security assumption: q-SDH+CDH assumption which is provided by us. And we show that the proposed scheme is very efficient in terms of computational costs of generation and verification of a signature. Because no pairing operator is required in the signing phase of our scheme, thus our blind signature scheme is very efficient in terms of computational cost.
...2.An Electronic Auction Scheme Based on Group Signatures and Partially Blind Signatures
- 关键词:
- group signatures; partially blind signatures; electronic auction;trusted third party; vickrey auction
- Ding Yong;Li Bin;Zheng Zhaoxia
- 《International Conference on Advanced in Control Engineering andInformation Science 》
- 2011年
- AUG 18-19, 2011
- Dali, PEOPLES R CHINA
- 会议
A new electronic auction scheme is proposed based on group signatures and partially blind signatures. At the same security strengthen, an optimization was done on the processes of electronic auction scheme and the dependence on trusted third party was reduced, moreover, multiple goods is auctioned at the same time, therefore, this scheme suited to large-scale electronic auction. Furthermore, due to application of vickrey auctions, the principle of optimal allocation of goods is easily satisfied.
...3.Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring
- 关键词:
- Chameleon hashing; Factoring problem; Key exposure;SIGNATURE; HASHES
- Chen, Xiaofeng;Tian, Haibo;Zhang, Fangguo;Ding, Yong
- 《6th China International Conference on Information Security andCryptology 》
- 2011年
- OCT 20-23, 2010
- Shanghai, PEOPLES R CHINA
- 会议
Chameleon signatures simultaneously provide the properties of non-repudiation and non-transferability for the signed message. However, the initial constructions of chameleon signatures suffer from the key exposure problem of chameleon hashing. This creates a strong disincentive for the recipient to forge signatures, partially undermining the concept of non-transferability. Recently, some specific constructions of key-exposure free chameleon hashing based on various assumptions are presented.In this paper, we present some security flaws of the key-exposure free chameleon hash scheme based on factoring [10]. Besides, we propose an improved chameleon hash scheme without key exposure based on factoring which enjoys all the desired security notions of chameleon hashing.
...
