通信学报 ›› 2020, Vol. 41 ›› Issue (6): 61-69.doi: 10.11959/j.issn.1000-436x.2020129

• 学术论文 • 上一篇    下一篇

安全加密的门限签名混淆

李亚红1,王彩芬2,3,张玉磊2,杨小东2,黄海燕1   

  1. 1 兰州交通大学电子与信息工程学院,甘肃 兰州 730070
    2 西北师范大学计算机科学与工程学院,甘肃 兰州 730070
    3 深圳技术大学大数据与互联网学院,广东 深圳 518118
  • 修回日期:2020-04-02 出版日期:2020-06-25 发布日期:2020-07-04
  • 作者简介:李亚红(1984- ),女,甘肃定西人,博士,兰州交通大学副教授,主要研究方向为密码学和信息安全|王彩芬(1963- ),女,河北安国人,博士,西北师范大学教授、博士生导师,主要研究方向为密码学、网络安全和信息安全|张玉磊(1979- ),男,甘肃靖远人,博士,西北师范大学副教授,主要研究方向为信息安全|杨小东(1981- ),男,甘肃甘谷人,博士,西北师范大学副教授,主要研究方向为信息安全学及云计算安全|黄海燕(1988- ),女,甘肃张掖人,博士,兰州交通大学副教授,主要研究方向为认知协作传输
  • 基金资助:
    国家自然科学基金资助项目(61063041);国家自然科学基金资助项目(61901201);兰州交通大学青年科学基金资助项目(2018002)

Secure obfuscation for encrypted threshold signatures

Yahong LI1,Caifen WANG2,3,Yulei ZHANG2,Xiaodong YANG2,Haiyan HUANG1   

  1. 1 College of Telecommunication Engineering,Lanzhou Jiaotong University,Lanzhou 730070,China
    2 College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China
    3 College of Big Data and Internet,Shenzhen Technology University,Shenzhen 518118,China
  • Revised:2020-04-02 Online:2020-06-25 Published:2020-07-04
  • Supported by:
    The National Natural Science Foundation of China(61063041);The National Natural Science Foundation of China(61901201);The Youth Science Foundation of Lanzhou Jiaotong University(2018002)

摘要:

针对门限签名密钥泄露的安全问题,首先提出了一个加密门限签名功能,并对所提功能混淆,混淆电路的输出可交给任意第三方执行,不会泄露门限签名密钥的信息。然后定义了加密门限签名功能和混淆器的安全模型,存在不可伪造性和平均情况虚拟黑盒性质,并对其正确性和安全性进行证明。理论和仿真实验分析表明,对加密门限签名的混淆具有可行性。

关键词: 混淆, 加密门限签名, 加密私钥, 平均情况虚拟黑盒性质

Abstract:

Aiming at the key leakage security problem of the threshold signature,an encrypted threshold signature functionality was firstly proposed and securely obfuscated.The output of obfuscated circuit could be implemented by any third party without revealing the private key of threshold signature.Secondly,the security models of encrypted threshold signature functionality and the obfuscator were defined,such as the existential unforgeablity and the average case virtual black box property,and its correctness and security were proved.The analyses of theory and simulation experiment show that the obfuscation for encrypted threshold signature has feasibility.

Key words: obfuscation, encrypted threshold signature, encrypted private key, average case virtual black box property

中图分类号: 

No Suggested Reading articles found!