普适计算环境下高效的分布式安全性与隐私性问题研究

项目来源

国家自然科学基金(NSFC)

项目主持人

丁勇

项目受资助机构

桂林电子科技大学

立项年度

2009

立项时间

未公开

项目编号

60963024

研究期限

未知 / 未知

项目级别

国家级

受资助金额

20.00万元

学科

信息科学-计算机科学-信息安全

学科代码

F-F02-F0206

基金类别

地区科学基金项目

关键词

安全性 ; 隐私性 ; 普适计算环境 ; 分布式 ; Authentication and Key Agreeme ; Anonymous ; Pervasive Computing Environmen ; Anonymity Measurement ; Unlinkability

参与者

刘忆宁;陈汝伟;唐敏;吕露;洪银芳;叶俊;郑良洪

参与机构

海南大学;桂林航天工业学院

项目标书摘要:普适计算环境在安全方面同时也面临着两个层面的问题:安全问题和隐私保护问题。同时,由于普适计算环境网络架构的复杂性以及一些应用的特殊性,使得分布式的网络协议更具合理性和针对性。本项目将致力于分析和设计普适计算环境中高效的基于分布式的匿名安全协议(主要是认证协议和授权协议),并对协议的安全性分析和证明,对其匿名性采用信息熵方法进行定量的分析,对其分布性也进行定量分析,对其效率进行分析和仿真。.本项目将解决普适计算环境中的安全和隐私保护问题,为推动普适计算在学术界和工业界的进一步发展起到较为重要的作用。

项目受资助省

广西壮族自治区

项目结题报告(全文)

本项目围绕普适计算环境下的安全性和隐私性问题展开研究工作。主要工作分以下几个方面阐述。(1)设计适合于普适计算环境下的匿名认证协议,如提出了一个不可链接的属性隐藏的可认证密钥协商协议、WiFi-3G-INTERNET的跨平台认证协议、基于线性对的无线传感器网络匿名广播认证协议、等,这些协议都是普适计算环境下,考虑了匿名性和认证型问题的结合,既保证了身份认证性,又保护了认证节点的匿名性,从而保护期隐私问题不受侵犯,较好的解决了普适计算环境下匿名认证的问题。(2)而对匿名度量问题,我们也提出了一个基于信息熵偏差匿名性的比较模型,该模型能够用于不同的系统之间匿名性的比较,并且根据各个节点对系统的影响客观的给出了各个节点的权重,显得客观、合理。(3)对于匿名授权协议分布性度量问题,由于相关研究文献较少,项目研究进展也不顺利,研究未能取得较好的发现。(4)课题研究过程中,我也取得了一系列和课题有关的研究成果。如,我们提出了几个椭圆曲线密码快速算法,使得椭圆曲线密码能够更好的应用于普适计算环境下的安全协议构造;提出了一种有限域上的可验证随机数的构造,使得安全协议中的随机数可被验证,从而进一步提高了协议的安全性,并应用可验证随机数构造了如群签名、电子选举、电子彩票等安全协议;我们对数字水印问题、会议密钥协商、混沌加密等其他和项目相关的安全问题也展开了研究,取得了一些积极的成果。项目按照进度和计划正常开展,共发表科研论文21篇,其中SCI检索1篇,EI检索论文14篇,核心期刊12篇,在国际会议上做分组报告5次,获得中国专利授权2项,出版专著1本,培养青年教师2名(2名青年教师都已经考上国内知名高校博士),硕士毕业8名。项目组邀请了美国密苏里大学韩亮教授、美国明尼苏达大学罗智泉教授、美国University ofMassachusetts Lowell的付新文副教授、西安电子科技大学王育民教授、西安电子科技大学胡予濮教授、陕西师范大学杨波教授等国内外知名专家到我校做学术交流,很好的促进了本项目的研究工作。总之,本项目达到了项目的预期目的,较好的完成了项目的各项任务。

  • 排序方式:
  • 1
  • /
  • 1.Efficient Self-Certified Blind Signature Scheme with Parings

    • 关键词:
    • self-certified cryptography; blind signature; the CDH problem; pairingoperator
    • Zhang, Jian-hong;Zhen, Wei-na
    • 《International Conference on Wireless Communication and Sensor Network》
    • 2014年
    • DEC 13-14, 2014
    • Wuhan, PEOPLES R CHINA
    • 会议

    Blind signature is a special anonymous technique; it can realize the anonymity of the signed message. A common blind signature is achieved in PKI and ID-based cryptography. However, self-certified signature scheme is a better choice than that in traditional public key system and ID-based cryptography, since it omits key escrow problem of ID-based crypto-system and avoids complex certificate management of traditional PKI. In the work, we first formalized the security models of self-certified blind signature by classifying its adversary types. Then, we proposed a concrete instance. And we also show that the proposed scheme is provably secure in the random oracle models and the security of the scheme is closely related to a extended security assumption: q-SDH+CDH assumption which is provided by us. And we show that the proposed scheme is very efficient in terms of computational costs of generation and verification of a signature. Because no pairing operator is required in the signing phase of our scheme, thus our blind signature scheme is very efficient in terms of computational cost.

    ...
  • 2.An Electronic Auction Scheme Based on Group Signatures and Partially Blind Signatures

    • 关键词:
    • group signatures; partially blind signatures; electronic auction;trusted third party; vickrey auction
    • Ding Yong;Li Bin;Zheng Zhaoxia
    • 《International Conference on Advanced in Control Engineering andInformation Science 》
    • 2011年
    • AUG 18-19, 2011
    • Dali, PEOPLES R CHINA
    • 会议

    A new electronic auction scheme is proposed based on group signatures and partially blind signatures. At the same security strengthen, an optimization was done on the processes of electronic auction scheme and the dependence on trusted third party was reduced, moreover, multiple goods is auctioned at the same time, therefore, this scheme suited to large-scale electronic auction. Furthermore, due to application of vickrey auctions, the principle of optimal allocation of goods is easily satisfied.

    ...
  • 3.Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring

    • 关键词:
    • Chameleon hashing; Factoring problem; Key exposure;SIGNATURE; HASHES
    • Chen, Xiaofeng;Tian, Haibo;Zhang, Fangguo;Ding, Yong
    • 《6th China International Conference on Information Security andCryptology 》
    • 2011年
    • OCT 20-23, 2010
    • Shanghai, PEOPLES R CHINA
    • 会议

    Chameleon signatures simultaneously provide the properties of non-repudiation and non-transferability for the signed message. However, the initial constructions of chameleon signatures suffer from the key exposure problem of chameleon hashing. This creates a strong disincentive for the recipient to forge signatures, partially undermining the concept of non-transferability. Recently, some specific constructions of key-exposure free chameleon hashing based on various assumptions are presented.In this paper, we present some security flaws of the key-exposure free chameleon hash scheme based on factoring [10]. Besides, we propose an improved chameleon hash scheme without key exposure based on factoring which enjoys all the desired security notions of chameleon hashing.

    ...
  • 排序方式:
  • 1
  • /