For the traditional threshold signature mechanism does not considers whether the nodes which generate part signature are trusted and the traditional signature strategy doesn’t do well in resisting internal attacks an...For the traditional threshold signature mechanism does not considers whether the nodes which generate part signature are trusted and the traditional signature strategy doesn’t do well in resisting internal attacks and external attacks and collusion attacks, so this paper presents a new threshold signature based on Trusted Platform Module (TPM), based on TPM the signature node first should finish the trust proof between it an other members who take part in the signature. Using a no-trusted center and the threshold of the signature policy, this strategy can track active attacks of the key management center and can prevent framing the key management center, this strategy takes into account the limited computing power TPM and has parameters of simple, beneficial full using of the limited computing power TPM.展开更多
针对现有的基于身份加密(identity based encryption,IBE)体系中缺乏权限管理问题,提出一种基于信任服务IBE体系下的权限管理方案.该方案采用门限的思想和算法对服务进行集中管理,并结合基于角色的访问控制管理权限,实现了细粒度的权限...针对现有的基于身份加密(identity based encryption,IBE)体系中缺乏权限管理问题,提出一种基于信任服务IBE体系下的权限管理方案.该方案采用门限的思想和算法对服务进行集中管理,并结合基于角色的访问控制管理权限,实现了细粒度的权限管理.采用信任继承的思想为用户分配角色,并采用集中审计的思想维护系统,提高了系统的可靠性.展开更多
文摘For the traditional threshold signature mechanism does not considers whether the nodes which generate part signature are trusted and the traditional signature strategy doesn’t do well in resisting internal attacks and external attacks and collusion attacks, so this paper presents a new threshold signature based on Trusted Platform Module (TPM), based on TPM the signature node first should finish the trust proof between it an other members who take part in the signature. Using a no-trusted center and the threshold of the signature policy, this strategy can track active attacks of the key management center and can prevent framing the key management center, this strategy takes into account the limited computing power TPM and has parameters of simple, beneficial full using of the limited computing power TPM.
文摘针对现有的基于身份加密(identity based encryption,IBE)体系中缺乏权限管理问题,提出一种基于信任服务IBE体系下的权限管理方案.该方案采用门限的思想和算法对服务进行集中管理,并结合基于角色的访问控制管理权限,实现了细粒度的权限管理.采用信任继承的思想为用户分配角色,并采用集中审计的思想维护系统,提高了系统的可靠性.