主页期刊介绍编委会编辑部服务介绍道德声明在线审稿编委办公English
2022年专刊出版计划 微信服务介绍 最新一期:2021年第4期
     
在线出版
各期目录
纸质出版
分辑系列
论文检索
论文排行
综述文章
专刊文章
美文分享
各期封面
E-mail Alerts
RSS
旧版入口
中国科学院软件研究所
  
投稿指南 问题解答 下载区 收费标准 在线投稿
曹珍富.两类强壮的门限密钥托管方案.软件学报,2003,14(6):1164-1171
两类强壮的门限密钥托管方案
Two Classes of Robust Threshold Key Escrow Schemes
投稿时间:2002-05-13  修订日期:2002-08-14
DOI:
中文关键词:  密钥托管  门限方案  强壮性  改进的RSA体制  ElGamal体制  托管代理,监听
英文关键词:key escrow  threshold scheme  robustness  improved RSA cryptosystem  ElGamal cryptosystem  escrow agent  monitor
基金项目:Supported by the National Natural Science Foundation of China under Grant No.60072018 (国家自然科学基金); the National Natural Science Foundation of China for Distinguished Young Scholars under Grant No.60225007 (国家杰出青年科学基金); the National Research Foundation for the Doctoral Program of Higher Education of China under Grant No.20020248024 (国家教育部高等学校博士点基金)
作者单位
曹珍富 上海交通大学,计算机科学与技术系,上海,200030 
摘要点击次数: 3568
全文下载次数: 3566
中文摘要:
      提出了门限密钥托管方案强壮性的概念,即对于一个强壮的门限密钥托管方案(robust threshold key escrow scheme,简称RTKES),即使在恶意托管人数大于或等于门限值时仍然无法获取系统密钥或用户密钥.很明显,RTKES解决了"用户的密钥完全依赖于可信赖的托管机构"这一问题.证明了RTKES是存在的,并且还给出两类RTKES的具体设计.这些方案有效地解决了"一次监听,永久监听"的问题,每个托管人能够验证他所托管的子密钥的正确性,并且在监听阶段,监听机构能够确切地知道哪些托管人伪造或篡改了子密钥.由于提出的方案是门限密钥托管方案,所以在所有托管人中当有一个或几个托管人不愿合作或无法合作时,监听机构仍能够通过另外有效的k个托管人去重构会话密钥,从而实施监听.此外,RTKES还具有抵抗LEAF反馈攻击的特性.
英文摘要:
      The definition of robust threshold key escrow scheme (RTKES) is proposed in this paper. Namely, in RTKES, malice escrow agency fail to obtain the system secret key or user抯 secret key, even if the number of malice escrow agency is more than or equal to the value of threshold. Clearly, the problem of 搖ser抯 secret key completely depends on the trusted escrow agency?is solved if RTKES exists. In this paper, it is proved that the RTKES does exist, and some concrete designs of two classes of RTKES are given. In these schemes, the problem of 搊nce monitor, monitor for ever?is solved effectively, every escrow agency can verify correctness of the secret shadow that he escrows during secret shadow distribution and monitor agency can exactly decide which escrow agency forges or tampers secret shadow during monitor procedure. Since the proposed RTKES is also threshold key escrow scheme, when an escrow agency or few agencies is not cooperating, monitor agency can easily reconstruct session key to monitor as long as there are other k effective escrow agencies. In addition, it also resists against LEAF feedback attack.
HTML  下载PDF全文  查看/发表评论  下载PDF阅读器
 

京公网安备 11040202500064号

主办单位:中国科学院软件研究所 中国计算机学会 京ICP备05046678号-4
编辑部电话:+86-10-62562563 E-mail: jos@iscas.ac.cn
Copyright 中国科学院软件研究所《软件学报》版权所有 All Rights Reserved
本刊全文数据库版权所有,未经许可,不得转载,本刊保留追究法律责任的权利