检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:封化民 史瑞 袁峰 李艳俊 杨旸[5] FENG Huamin;SHI Rui;YUAN Feng;LI Yanjun;YANG Yang(School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing 100876,China;Institute of Information Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China;Institute 706,Second Academy of CASIC,Beijing 100854,China;The 15th Research Institute of CETC,Beijing 100846,China;College of Mathematics and Computer Science,Fuzhou University,Fuzhou 350108,China)
机构地区:[1]北京邮电大学网络空间安全学院,北京100876 [2]北京电子科技学院信息安全研究所,北京100070 [3]中国航天科工集团第二研究院706所,北京100854 [4]中国电子科技集团第十五研究所,北京100846 [5]福州大学数学与计算机科学学院,福建福州350108
出 处:《通信学报》2022年第3期63-75,共13页Journal on Communications
基 金:国家重点研发计划基金资助项目(No.2018YFB0803600);北京电子科技学院一流学科建设基金资助项目(No.3201024)。
摘 要:为了解决电子票据中面临的效率低、灵活性差和隐私保护不全面的问题,提出了高效的强隐私保护且可转让的属性票据方案。首先,结合属性证书和集合承诺构建了基于属性泄露的票据购买算法;其次,利用等价类上的结构保持签名和动态可延展签名降低了票据购买的计算复杂度,实现了常数复杂度的票据转让和票据验证;再次,为了杜绝恶意的验票方根据卖方身份猜测用户信息的可能,在票据验证中同时实现了用户和卖方的匿名性;最后,给出了方案的安全性定义,并将其安全性规约到普通密码学假设或已证明安全的密码学原语的安全性上。对比和实验结果表明了所提方案的灵活性和高效性。To solve the problems of efficiency,flexibility,and privacy protection faced by electronic tickets,an efficient and transferable attribute-based ticket scheme with strong privacy protection was proposed.Firstly,a ticket issuing algo-rithm based on attribute disclosure was constructed by combining attribute-based credentials and set commitment.Se-condly,the structure-preserving signature on equivalence class and dynamic malleable signature were used to reduce the computational complexity of the ticket issuance,and the ticket transfer and ticket verification with constant complexity were realized.In addition,to prevent the possibility of malicious verifiers guessing user information according to the sel-ler’s identity,the scheme not only realized the anonymity of the user,but also realized the anonymity of the seller in the ticket verification for the first time.Finally,the security definition of the scheme was given,and its security was reduced to either well-known complexity cryptography assumptions or the security of proven cryptography primitives.Compari-son and experimental results demonstrate that the proposed scheme is flexible and efficient.
分 类 号:TP309.2[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222