|
- 2016
满足可控关联性的合作群签名方案
|
Abstract:
摘要: 已有的满足可控关联性的群签名方案(简称GS-OL方案)并未考虑群成员私钥有可能泄露和单一打开权威可能会损害用户隐私的问题。而且,此类方案在用户端运算效率方面尚存在改进空间。为此,对已有的GS-OL方案安全模型做出扩展,并提出效率更高的改进方案。新方案借助无双线性对的Boneh-Boyen签名技术使得用户端免于执行低效的对运算,利用合作群签名技术解决了群成员私钥泄露问题,并且利用分布式密钥产生、同时执行的零知识证明和关于“掌握给定元素的群同态前像”的分布式零知识证明等技术实现了对打开权威权利的分享。此外,基于新的GS-OL方案构造了一个实用的匿名订购系统。与已有同类系统相比,新系统同时满足允许令牌过期作废和支持隐私保护数据挖掘等多个实用性质,而且在用户端运算效率方面具有显著优势。
Abstract: The existing group signature schemes with controllable linkability(abbreviated as GS-OL)suffer from the following two deficiencies, i.e., group members’ private keys are likely to leak and the Open Authority may harm users’ privacy. Moreover, there is still room for improvement in the computational efficiency of users. To correct this situation, an extension of the existing GS-OL security model was made, and an improved scheme with higher efficiency was provided. By using the Boneh-Boyen signature scheme without pairings, the users were liberated from performing expensive pairing computations. Borrowing the ideas of cooperative group signatures, the problem of private key leakage of group members was also solved. Moreover, in order to decentralize the Open Authoritys power, the technique of distributed key generation, committed zero-knowledge proof of knowledge, and distributed proof of knowledge of preimages of group homomorphism were incorporated in the new scheme. In addition, a practical anonymous subscription system based on the new GS-OL scheme was proposed. Compared with previous systems, the new system meets several practical properties such as allowing customers’ tokens to expire and supporting privacy-preserving data mining, and it has obvious advantage in users’ operational efficiency
[1] | YANG Yanjiang, DING Xuhua, LU Haibing, et al. Self-blindable credential: towards lightweight anonymous entity authentication[EB/OL].(2013-04-10)[2015-03-01]. https://eprint.iacr.org/2013/207.pdf. |
[2] | KIAYIAS A, XU S, YUNG M. Privacy preserving data mining within anonymous credential systems[C] // Proceedings of SCN 2008. Berlin: Springer, 2008: 57-76. |
[3] | LYSYANSKAYA A. Threshold cryptography secure against the adaptive adversary, concurrently[EB/OL].(2000-05-12)[2015-09-01]. http://eprint.iacr.org/2000/019.pdf. |
[4] | VASCO M I G, HEIDARVAND S, VILLAR J L. Anonymous subscription schemes-a flexible construction for on-line services access[C] // Proceedings of SECRYPT 2010. New York: IEEE Press, 2010: 120-131. |
[5] | BERNHARD D, FUCHSBAUER G, GHADAFI E, et al. Anonymous attestation with user-controlled linkability[J]. International Journal of Information Security, 2013, 12(3):219-249. |
[6] | SLAMANIG D, SPREITZER R, UNTERLUGGAUER T. Adding controllable linkability to pairing-based group signatures for free[C] // Proceedings of ISC 2014. Berlin: Springer, 2014: 388-400. |
[7] | HWANG J Y, CHEN L, CHO H S, et al. Short dynamic group signature scheme supporting controllable linkability[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(6):1109-1124. |
[8] | ISERN-DEYà A P, HUGUET-ROTGER L, PAYERAS-CAPELLà M M, et al. On the practicability of using group signatures on mobile devices: implementation and performance analysis on the android platform[J]. International Journal of Information Security, 2015,14(4):335-345. |
[9] | CANARD S, COISEL I, MEULENAER G D, et al. Group signatures are suitable for constrained devices[C] // Proceedings of ICISC 2010. Berlin: Springer, 2011: 133-150. |
[10] | BONEH D, BOYEN X. Short signatures without random oracles and the SDH assumption in bilinear groups[J]. Journal of Cryptology, 2008, 21(2):149-177. |
[11] | KELLER M, MIKKELSEN G L, RUPP A. Efficient threshold zero-knowledge with applications to user-centric protocols[C] // Proceedings of ICITS 2012. Berlin: Springer, 2012: 147-166. |
[12] | BLANTON M. Online subscriptions with anonymous access[C] // Proceedings of ASIA-CCS 2008. New York: ACM Press, 2008: 217-227. |
[13] | CANARD S, JAMBERT A. Untraceability and profiling are not mutually exclusive[C] // Proceedings of TrustBus 2010. Berlin: Springer, 2010: 117-128. |
[14] | HWANG J Y, LEE S, CHUNG B H, et al. Group signatures with controllable linkability for dynamic membership[J]. Information Sciences, 2013, 222:761-778. |
[15] | SENEVIRATNE J, PARAMPALLI U, KULIK L. An authorised pseudonym system for privacy preserving location proof architectures[C] // Proceedings of AISC 2014.New York: ACM Press, 2014: 47-56. |
[16] | ABE M, CHOW S S M, HARALAMBIEV K, et al. Double-trapdoor anonymous tags for traceable signatures[J]. International Journal of Information Security, 2013, 12(1):19-31. |
[17] | CANARD S, COISEL I, JAMBERT A, et al. New results for the practical use of range proofs[C] // Proceedings of EuroPKI 2013. Berlin: Springer, 2014: 47-64. |
[18] | GENNARO R, JARECKI S, KRAWCZYK H, et al. Secure distributed key generation for discrete-log based cryptosystems[J]. Journal of Cryptology, 2007, 20(1):51-83. |
[19] | AU M H, SUSILO W, MU Y, et al. Constant-size dynamic k-times anonymous authentication[J]. IEEE Systems Journal, 2013, 7(2):249-261. |
[20] | ARFAOUI G, LALANDE J F, TRAORé J, et al. A practical set-membership proof for privacy-preserving NFC mobile ticketing[C] // Proceedings of PETS 2015. Berlin: De Gruyter Press, 2015: 25-45. |
[21] | LIU Xin. Practical anonymous subscription system with privacy preserving data mining[C] // Proceedings of ICSESS 2011. New York: IEEE Press, 2011: 409-413. |
[22] | LEE M Z, DUNN A M, KATZ J, et al. Anon-Pass: practical anonymous subscriptions[J]. IEEE Security & Privacy, 2014, 12(3):20-27. |
[23] | 柳欣,雷文庆. 无随机预言的完全匿名多服务订购系统[J]. 计算机应用,2013, 33(2):417-422, 429. LIU Xin, LEI Wenqing. Fully anonymous multi-service subscription system without random oracles[J]. Journal of Computer Applications, 2013, 33(2):417-422, 429. |
[24] | OGAWA K, OHTAKE G, FUJII A, et al. Weakened anonymity of group signature and its application to subscription services[J]. IEICE Transactions on Fundamentals of Electronics Communications and Computer Science, 2014, E97-A(6):1240-1258. |
[25] | MAURER U. Unifying zero-knowledge proofs of knowledge[C] // Proceedings of AFRICACRYPT 2009. Berlin: Springer, 2009: 272-286. |
[26] | AU M H, LIU J K, FANG J, et al. A new payment system for enhancing location privacy of electric vehicles[J]. IEEE Transactions on Vehicular Technology, 2014, 63(1):3-18. |