两类强壮的门限密钥托管方案
DOI:
作者:
作者单位:

作者简介:

通讯作者:

中图分类号:

基金项目:

Supported by the National Natural Science Foundation of China under Grant No.60072018 (国家自然科学基金); the National Natural Science Foundation of China for Distinguished Young Scholars under Grant No.60225007 (国家杰出青年科学基金); the National Research Foundation for the Doctoral Program of Higher Education of China under Grant No.20020248024 (国家教育部高等学校博士点基金)


Two Classes of Robust Threshold Key Escrow Schemes
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    提出了门限密钥托管方案强壮性的概念,即对于一个强壮的门限密钥托管方案(robust threshold key escrow scheme,简称RTKES),即使在恶意托管人数大于或等于门限值时仍然无法获取系统密钥或用户密钥.很明显,RTKES解决了"用户的密钥完全依赖于可信赖的托管机构"这一问题.证明了RTKES是存在的,并且还给出两类RTKES的具体设计.这些方案有效地解决了"一次监听,永久监听"的问题,每个托管人能够验证他所托管的子密钥的正确性,并且在监听阶段,监听机构能够确切地知道哪些托管人伪造或篡改了子密钥.由于提出的方案是门限密钥托管方案,所以在所有托管人中当有一个或几个托管人不愿合作或无法合作时,监听机构仍能够通过另外有效的k个托管人去重构会话密钥,从而实施监听.此外,RTKES还具有抵抗LEAF反馈攻击的特性.

    Abstract:

    The definition of robust threshold key escrow scheme (RTKES) is proposed in this paper. Namely, in RTKES, malice escrow agency fail to obtain the system secret key or user抯 secret key, even if the number of malice escrow agency is more than or equal to the value of threshold. Clearly, the problem of 搖ser抯 secret key completely depends on the trusted escrow agency?is solved if RTKES exists. In this paper, it is proved that the RTKES does exist, and some concrete designs of two classes of RTKES are given. In these schemes, the problem of 搊nce monitor, monitor for ever?is solved effectively, every escrow agency can verify correctness of the secret shadow that he escrows during secret shadow distribution and monitor agency can exactly decide which escrow agency forges or tampers secret shadow during monitor procedure. Since the proposed RTKES is also threshold key escrow scheme, when an escrow agency or few agencies is not cooperating, monitor agency can easily reconstruct session key to monitor as long as there are other k effective escrow agencies. In addition, it also resists against LEAF feedback attack.

    参考文献
    相似文献
    引证文献
引用本文

曹珍富.两类强壮的门限密钥托管方案.软件学报,2003,14(6):1164-1171

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2002-05-13
  • 最后修改日期:2002-08-14
  • 录用日期:
  • 在线发布日期:
  • 出版日期:
您是第位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号