期刊文献+

一种支持悬赏的匿名电子举报方案的安全性分析及设计 被引量:4

Cryptanalysis and Design of an Anonymous E-Prosecution Scheme with Reward Support
在线阅读 下载PDF
导出
摘要 对Miao-wang-Miao-Xiong匿名电子举报方案进行了安全性分析,指出其存在的安全性缺陷,该方案不满足其要求的举报信息机密性,以及不满足对举报人提供有效的激励机制.设计了破坏这两种性质的攻击方法.为设计满足要求的支持悬赏的匿名电子举报方案,利用安全的基于双线性对的举报受理者公钥加密方案、安全的指定验证者的环签名方案提出了一种支持悬赏的匿名电子举报方案设计模式.经安全性分析,设计模式是安全的. Miao-Wang-Miao-Xiong' s anonymous E-Prosecution scheme was analyzed. The security flaws were pointed out. The original scheme can' t guarantee the security of prosecution contents and effective reward support. We design the attack methods to break the two properties. In order to design an anonymous E-Prosecution scheme with reward support, we make use of the secure public key encrypfion scheme from bilinear pairings, secure designated verifier ring signature scheme to propose the design model of anonymous E-Prosecution scheme. Through security analysis, our design model is secure.
出处 《电子学报》 EI CAS CSCD 北大核心 2009年第8期1826-1829,共4页 Acta Electronica Sinica
基金 国家自然科学基金(No.60673070) 辽宁省教育厅科技研究资助项目(No.2008140 05L09 2008150) 大连水产学院人才引进项目(No.SYYJ200612) 大连水产学院科研计划(No.SY2007032) 福建师范大学网络安全与密码技术重点实验室开放课题(No.09A005) 大连市基金(No.2005J22JH038)
关键词 匿名电子举报 指定验证者环签名 双线性对 anonymous E-Prosecution designated verifier ring signature bilinear pairings
  • 相关文献

参考文献10

  • 1苗付友,王行甫,苗辉,熊焰.一种支持悬赏的匿名电子举报方案[J].电子学报,2008,36(2):320-324. 被引量:8
  • 2Chaum D, Heyst E. Group signatures[ A]. Eurocrypt' 91[ C ]. LNCS547, Berlin: Springer-Verlag, 1991.257 - 265.
  • 3Cramer R, Damgard I, et al. Proofs of partial knowledge and simplified design of witness hiding protocols [ A ]. Crypt' 94 [C]. LNCS 839, Berlin: Springer-Verlag, 1994. 174 - 187.
  • 4Camenisch J. Efficient and generalized group signatures[ A]. Eurocrypt' 97[ C ]. LNCS 1233, Berlin: Springer-Verlag, 1997. 465 - 479.
  • 5Rive.st R L, Shamir A, et al. How to leak a secret [ A ]. Asiacrypt' 01 [ C]. LNCS 2248, Berlin: Springer-Verlag, 2001. 552 - 565.
  • 6Liu Y W, Liu J K, et al. Revocable ring signature [ J ]. Journal of Computer Science and Technology. 2007,22(6) : 785 - 794.
  • 7Au M H,Liu J K, et al. Certificate based( linkable) ring signature[A]. ISPEC 2007[C] .LNCS 4464,2007.79- 92.
  • 8Jin Li, Yanming Wang. Universal designated verifier ring signature ( proof ) without random oracles [ A ]. ENC2006 [ C ]. LNCS4097,2006.332 - 341.
  • 9Ji-Seon Lee, Jik Hyun Chang. Strong designated verifier ring signature scheme [ A ]. 21307 Innovations and Advanced Techniques in Computer and Information Sciences and Engineering [ C]. Springer Netherlands. 2007.543 - 547.
  • 10Boneh D,Franklin M. Identity-based encryption from the Weil pairing [ A ]. Crypto' 01[ C]. LNCS 2139, Berlin: Springer- Verlag,2001. 213 - 229.

二级参考文献8

  • 1MIAO Fuyou XIONG Yan YANG Shoubao WANG Xingfu.A Provable Encrypted Ring Signature from Bilinear Pairings[J].Chinese Journal of Electronics,2006,15(2):204-208. 被引量:3
  • 2Ronald L Rivest,Adi Shamir,Yael Tauman. How to leak a secret[ A]. 7th International Conference on the Theory and Application of Cryptology and Information Security [ C ]. Springer- Verlag, 2001, LNCS2248.552- 565.
  • 3Javier Herranz, German Saez. New identity-based ring signature schemes[ A ]. Proceedings of Information and Communications Security, 6th International Conference [ C ]. Springer-Verlag, 2004.ICICS 2004,LNCS 3269.27- 39.
  • 4Javier Herranz, German Saez. Forking lemmas for ring signature schemes[ A]. INDOCRYPT 2003[ C ]. Springer-Verlag, 2003. LNCS 2904.266- 279.
  • 5Emmanuel Bresson, Jacques Stem, Michael Szydlo.Threshold ring signatures and applications to Ad-hoc groups[ A ]. Advances in Cryptology-CRYPTO' 02 [ C ]. Springer-Verlag, 2002. LNCS 2442.465 - 480.
  • 6Fangguo Zhang, Kwangjo Kim. ID-based blind signature and ring signature from pairings[ A]. Advaaces in Cryptology-Asiacrypt 2002 [C]. Springer-Verlag, 2002. LNCS 2501. 533 - 547.
  • 7Sherman S M Chow, S M Yiu, Lucas C K Hui. Efficient Identity Based Ring Signature [ DB/OL ]. http://eprint. iacr. org/ 2004/327. pdf, 2004.
  • 8Xinyi Huang,Willy Susilo, Yi Mu, Futai Zhang. Identity-based ring signcryption schemes: Crptographic primitives for preserving privacy and authenticity in the ubiquitous world[A]. 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 2[C].IEEE Society, Washington, DC, USA, 2005.649 - 654.

共引文献7

同被引文献35

  • 1陈泽文,张龙军,王育民,黄继武,黄达人.一种基于中国剩余定理的群签名方案[J].电子学报,2004,32(7):1062-1065. 被引量:57
  • 2张键红,伍前红,邹建成,王育民.一种高效的群签名[J].电子学报,2005,33(6):1113-1115. 被引量:25
  • 3张焕国,王张宜.密码学引论[M].武汉:武汉大学出版社,2009.
  • 4赵泽茂.数字盛名理论[MI.北京:科学出版社,2007.
  • 5Rivest R L, Shamir A, Adleman L. A method for obtaining digital signa- tures and public-key cryptosystems [ J ]. Communications of the ACM, 1976,21 (2) : 120 - 126.
  • 6Rivest R L, Shamir A,Tauman Y. How to leak a secret[ C]//Asia- crypt'01. LNCS 2248 ,Berlin: Springer-Verlag,2001:552 -565,.
  • 7Tao Y, Yang Y, Li Z, et al. Muhivariate threshold group signature scheme withstanding conspiracy attack [ C ]//Intelligent Control, Auto- matic Detection and High-End Equipment (ICADE) ,2012 IEEE Inter- national Conference on. IEEE ,2012 : 114 - 118.
  • 8Dong Q, Li X,Liu Y. Two extensions of the ring signature scheme of Rivest-Shamir-Taumann [ J ]. Information Sciences, 2012, 188 : 338 - 345.
  • 9Gao W, Wang G, Wang X, et al. Controllable ring signatures and its application to E-prosecution[ J ]. Journal of Computers, 2013, 8 ( 4 ) : 833 - 841.
  • 10Wang H. Admissible strong designated verifier signature from bilinear pairings [ J]. Security and Communication Networks, Wiley online li- brary,2013.

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部