通信学报 ›› 2016, Vol. 37 ›› Issue (10): 117-127.doi: 10.11959/j.issn.1000-436x.2016203

• 学术论文 • 上一篇    下一篇

支持身份认证的数据持有性证明方案

李昊星1,李凤华1,2,宋承根3,阎亚龙3   

  1. 1 西安电子科技大学综合业务网理论与关键技术国家重点实验室,陕西 西安 710071
    2 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
    3 北京电子科技学院信息安全研究所,北京 100070
  • 出版日期:2016-10-25 发布日期:2016-10-25
  • 基金资助:
    国家自然科学面上基金资助项目;国家高技术研究发展计划(“863”计划)基金资助项目;国家自然科学基金—广东联合基金资助项目

Provable data possession scheme with authentication

Hao-xing LI1,Feng-hua LI1,2,Cheng-gen SONG3,Ya-long YAN3   

  1. 1 State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China
    2 State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    3 Information Security Institute,Beijing Electronic Science and Technology Institute,Beijing 100070,China
  • Online:2016-10-25 Published:2016-10-25
  • Supported by:
    The National Natural Science Foundation of China General Project;The National High Technol-ogy Research and Development Program of China (863 Program);The National Natural Science Foundation of China-Guangdong Provincial People’s Government of the Joint Natural Science Fund Projects

摘要:

针对云应用场景中身份认证和数据持有性证明的双重需求,提出一种支持身份认证的数据持有性证明方案。基于数据标签签名和随机数复用,新方案通过3次交互即可实现用户对云持有数据的完整性验证、用户与云服务器之间的双向身份认证以及会话密钥协商与确认。与使用认证密钥协商和数据持有性证明的组合方案相比,新方案具有较少的运算量和交互轮次以及可证明的安全性。在随机预言机模型下,基于计算性 Diffie-Hellman 问题假设,给出方案的安全性证明。

关键词: 认证, 数据持有, 云计算, 可证明安全, 随机预言机

Abstract:

To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three interactions,including the possession proof of cloud data,the mutual authentication between user and cloud computing server,the session key agreement and confirmation.Compared to the simple combination of authentication key agreement and provable data possession schemes,the proposed scheme has less computation and interactions,and better provable securities.In the random oracle model,the security proof of the proposed scheme is given under the computational Diffie-Hellman assumption.

Key words: authentication, data possession, cloud computing, provable security, random oracle

No Suggested Reading articles found!