首页 | 本学科首页   官方微博 | 高级检索  
     

一种用于流交换的代理重签名方案
引用本文:孙奕,陈性元,杜学绘,陈亮,徐建. 一种用于流交换的代理重签名方案[J]. 软件学报, 2015, 26(1): 129-144
作者姓名:孙奕  陈性元  杜学绘  陈亮  徐建
作者单位:北京交通大学 计算机与信息技术学院, 北京 100044;解放军信息工程大学, 河南 郑州 450000;数学工程与先进计算国家重点实验室, 河南 郑州 450000;解放军信息工程大学, 河南 郑州 450000;解放军信息工程大学, 河南 郑州 450000;数学工程与先进计算国家重点实验室, 河南 郑州 450000;解放军信息工程大学, 河南 郑州 450000;解放军信息工程大学, 河南 郑州 450000
基金项目:国家高技术研究发展计划(863)(2012AA012704); 河南省科技创新人才计划(114200510001)
摘    要:为了解决大规模复杂网络环境下流交换的安全问题,首次将代理重签名技术应用到安全流交换中,提出一种用于流交换的基于陷门Hash函数的代理重签名方案.首先,针对陷门Hash函数在流交换应用中存在的密钥泄露问题,提出一种新的基于椭圆曲线的无密钥泄露的陷门Hash函数(EDL-MTH),并对其安全性加以证明;然后,基于EDL-MTH构造了一个在随机预言模型下可证明适应性选择消息攻击安全的代理重签名方案;最后,通过一个示例分析了该方案在安全流交换中的应用和性能.

关 键 词:流交换  陷门Hash函数  代理重签名  适应性选择消息攻击
收稿时间:2013-03-19
修稿时间:2013-08-21

Proxy Re-Signature Scheme for Stream Exchange
SUN Yi,CHEN Xing-Yuan,DU Xue-Hui,CHEN Liang and XU Jian. Proxy Re-Signature Scheme for Stream Exchange[J]. Journal of Software, 2015, 26(1): 129-144
Authors:SUN Yi  CHEN Xing-Yuan  DU Xue-Hui  CHEN Liang  XU Jian
Affiliation:School of Computer & Information Technology, Beijing Jiaotong University, Beijing 100044, China;PLA Information Engineering University, Zhengzhou 450000, China;State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450000, China;PLA Information Engineering University, Zhengzhou 450000, China;PLA Information Engineering University, Zhengzhou 450000, China;State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450000, China;PLA Information Engineering University, Zhengzhou 450000, China;PLA Information Engineering University, Zhengzhou 450000, China
Abstract:To tackle the problems of security stream exchange in the large-scale complicated network, this paper applies proxy re-signature technology for the first time to solve the flow exchange security issues, and proposes a proxy re-signature scheme based on trapdoor Hash function for stream exchange. Firstly, aiming at the key exposure problem of trapdoor Hash function for stream exchange, a new trapdoor Hash functions without key exposure (EDL-MTH) is put forward and its security is analyzed. Then, a new proxy re-signature scheme based on EDL-MTH is constructed and is proved against the chosen-message attack in the random oracle model. Furthermore, the performance of the scheme is analyzed contrast to the existing proven security proxy signature scheme, and the result shows the efficiency becomes more prominent while the scale of stream exchange is increased. Finally, a case study is provided to demonstrate its availability and performance in security stream exchange.
Keywords:stream exchange  trapdoor Hash functions  proxy re-signature  chosen adaptively message attack
本文献已被 CNKI 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号