期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
去中心化公钥基础设施综述
1
作者 史晁铭 闫峥 +2 位作者 张滋烔 王海光 李铁岩 《网络与信息安全学报》 2025年第6期17-35,共19页
公钥基础设施作为网络与信息安全领域的重要组成部分,在数字身份认证、安全数据传输和完整性保护等场景发挥着关键作用。然而,传统公钥基础设施的中心化架构存在显著缺陷:用户完全依赖可信第三方机构,导致个人数据控制权被削弱,并引发... 公钥基础设施作为网络与信息安全领域的重要组成部分,在数字身份认证、安全数据传输和完整性保护等场景发挥着关键作用。然而,传统公钥基础设施的中心化架构存在显著缺陷:用户完全依赖可信第三方机构,导致个人数据控制权被削弱,并引发单点故障、隐私泄露、中间人攻击等系统性风险,难以满足分布式网络环境的安全需求。为解决上述问题,去中心化公钥基础设施利用区块链技术实现去中心化的信任分布,有效消除单点故障风险;分布式账本技术使用户在进行身份验证时无须暴露过多的身份信息,降低隐私泄露的风险,同时其公开透明与不可篡改性可抵御数据窃取与身份伪造攻击,从而全面提升系统安全性与可靠性。系统梳理去中心化公钥基础设施的核心理论和技术基础,继而基于网络拓扑结构和信任管理模式,构建一个全面且系统的去中心化公钥基础设施分类框架。提出涵盖安全性、隐私性、性能以及其他维度的一系列评估指标,并根据提出的评估指标对现有的去中心化公钥基础设施方法进行回顾和分析。总结现有的去中心化公钥基础设施方法所面临的问题,并对未来趋势与研究方向进行展望。 展开更多
关键词 去中心化公钥基础设施 公钥证书 区块链 信任管理
在线阅读 下载PDF
Efficient identity-based threshold decryption scheme from bilinear pairings 被引量:1
2
作者 Wei GAO Guilin WANG +1 位作者 Kefei CHEN Xueli WANG 《Frontiers of Computer Science》 SCIE EI CSCD 2018年第1期177-189,共13页
Using Shamir's secret sharing scheme to indi- rectly share the identity-based private key in the form of a pairing group element, we propose an efficient identity-based threshold decryption scheme from pairings and p... Using Shamir's secret sharing scheme to indi- rectly share the identity-based private key in the form of a pairing group element, we propose an efficient identity-based threshold decryption scheme from pairings and prove its se- curity in the random oracle model. This new paring-based scheme features a few improvements compared with other schemes in the literature. The two most noticeable features are its efficiency, by drastically reducing the number of pair- ing computations, and the ability it gives the user to share the identity-based private key without requiring any access to a private key generator. With the ability it gives the user to share the identity-based private key, our ID-based threshold decryption (IBTD) scheme, the second of its kind, is signif- icantly more efficient than the first scheme, which was de- veloped by Baek and Zheng, at the expense of a slightly in- creased ciphertext length. In fact, our IBTD scheme tries to use as few bilinear pairings as possible, especially without depending on the suite of Baek-Zheng secret sharing tools based on pairings. 展开更多
关键词 identity-based cryptography threshold cryptog-raphy provable security random oracle model bilinear pair-ing identity-based threshold decryption
原文传递
Double-authentication-preventing signatures revisited:new definition and construction from chameleon hash
3
作者 Fei LI Wei GAO +2 位作者 Gui-lin WANG Ke-fei CHEN Chun-ming TANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第2期176-186,共11页
Double-authentication-preventing signature(DAPS) is a novel signature notion proposed at ESORICS2014. The double-authentication-preventing property means that any pair of signatures on two different messages with the ... Double-authentication-preventing signature(DAPS) is a novel signature notion proposed at ESORICS2014. The double-authentication-preventing property means that any pair of signatures on two different messages with the same subject will result in an immediate collapse of the signature system. A few potential applications of DAPS have been discussed by its inventors, such as providing a kind of self-enforcement to discourage certificate authority(CA) from misbehaving in public key infrastructure and offering CA some cryptographic arguments to resist legal coercion. In this study, we focus on some fundamental issues on DAPS. We propose a new definition,which is slightly weakened but still reasonable and strong enough to capture the DAPS concept. We develop the new notion of invertible chameleon hash functions with key exposure. Then we propose a generic DAPS scheme, which is provably secure if the underlying invertible chameleon hash function with key exposure is secure. We instantiate this general construction to obtain the DAPS schemes respectively based on the well-known assumptions of integer factorization, Rivest-Shamir-Adleman(RSA), and computational Diffie-Hellman(CDH). They are more efficient than previous DAPS schemes. Furthermore, unlike previous constructions, the trusted setup condition is not needed by our DAPS schemes based on RSA and CDH. 展开更多
关键词 Double-authentication-preventing SIGNATURES CHAMELEON HASH function Digital signature Provable security AUTHORITY trust level
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部