首页 | 本学科首页   官方微博 | 高级检索  
     

基于完全二叉树的入侵弹性签名方案
引用本文:李洪伟,孙世新,杨浩淼. 基于完全二叉树的入侵弹性签名方案[J]. 四川大学学报(工程科学版), 2008, 40(4): 160-165
作者姓名:李洪伟  孙世新  杨浩淼
作者单位:电子科技大学,计算机科学与工程学院,四川,成都,610054
基金项目:四川省科技厅青年软件创新工程项目
摘    要:入侵弹性技术通过周期性地进化密钥,有效地防止了密钥泄漏带来的危害.利用完全二叉树提出了一个新的入侵弹性签名方案(TBIRS),并且证明了方案的正确性和安全性.TBIRS按照二叉树前序遍历的方式进行密钥的更新,采用随机数加减的方法进行密钥的刷新,以二叉树的叶子节点作为密码系统的时间周期.与目前密钥安全性最好的SiBIR方案比较,TBIRS在取得相同密钥安全性的情况下,算法复杂度却由O(N)降低到O(logN).

关 键 词:完全二叉树  入侵弹性  签名方案  双线性映射
收稿时间:2007-01-25

Intrusion-resilient Signature Scheme Based on Complete Binary Tree
LI Hong-wei,SUN Shi-xin,YANG Hao-miao. Intrusion-resilient Signature Scheme Based on Complete Binary Tree[J]. Journal of Sichuan University (Engineering Science Edition), 2008, 40(4): 160-165
Authors:LI Hong-wei  SUN Shi-xin  YANG Hao-miao
Affiliation:College of Computer Sci. and Eng., Univ. of Electronic Sci. and Technol., Chengdu 610054,China;College of Computer Sci. and Eng., Univ. of Electronic Sci. and Technol., Chengdu 610054,China;College of Computer Sci. and Eng., Univ. of Electronic Sci. and Technol., Chengdu 610054,China
Abstract:Through periodically evolving key, intrusion resilient technique can powerfully defend the threat of key exposure.A new tree based intrusion resilient signature scheme (TBIRS) was proposed, and the correctness and security of TBIRS were testified. In the TBIRS, the pre order traversal of binary tree was applied to the key updating, random number was adopted in the key refreshing and the leaves were time periods. As compared with the most secure SiBIR scheme to date, TBIRS can achieve the same key security, but the algorithm complexity reduces from O(N) to O(logN).
Keywords:complete binary tree   intrusion-resilient   signature scheme   bilinear map
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《四川大学学报(工程科学版)》浏览原始摘要信息
点击此处可从《四川大学学报(工程科学版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号