Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds

被引:42
作者
Zhang, Mingwu [1 ]
Zhang, Yudi [2 ]
Jiang, Yan [3 ]
Shen, Jian [4 ]
机构
[1] Hubei Univ Technol, Sch Comp, Whuan 430068, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Whuan 430070, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211100, Jiangsu, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2019年 / 13卷 / 02期
基金
中国国家自然科学基金;
关键词
Average case; encrypted verifiable encrypted signature (EVES); obfuscation; untrusted cloud; virtual black-box; SECURE OBFUSCATION; EXCHANGE;
D O I
10.1109/JSYST.2019.2900723
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In EUROCRYPT' 10, Hada proposed a secure obfuscator of encrypted signature scheme which can be executed on an untrusted server to solve the security problem of untrusted proxy signature. In Hada's scheme, the server can generate a valid signature for the user without obtaining user's secret key; however, the scheme cannot resist the collusion attack. In this paper, we extend the study of encrypted signature schemes and propose an obfuscator for encrypted verifiable encrypted signature (EVES), andmodel the application in electronic transactions. The proposed scheme cannot only prevent the semihonest server from obtaining user's sensitive information, but also resist to the collusion activities between verifier/receiver and untrusted cloud. We show that the obfuscation scheme achieves the requirement of virtual black-box security under standard cryptographic assumptions. The experiments show that the time of constructing the EVES obfuscator is 63 ms, the signing time of the obfuscated algorithm is 78 ms, and the verifying time of obfuscated signature is 63 ms, which is more efficient and practical than related schemes, and the scheme can be deployed in scenarios requiring electronic transactions in outsourced clouds.
引用
收藏
页码:1478 / 1486
页数:9
相关论文
共 28 条
[1]  
Asokan N, 1998, LECT NOTES COMPUT SC, V1403, P591, DOI 10.1007/BFb0054156
[2]  
Ateniese G., 2004, ACM Transactions on Information and Systems Security, V7, P1, DOI 10.1145/984334.984335
[3]  
Balachandran Vivek, 2013, Information Security Practice and Experience. 9th International Conference, ISPEC 2013. Proceedings, P309, DOI 10.1007/978-3-642-38033-4_22
[4]   Efficient and practical fair exchange protocols with off-line TTP [J].
Bao, F ;
Deng, RH ;
Mao, WB .
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, :77-85
[5]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[6]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[7]  
Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P455
[8]  
Canetti R, 2008, LECT NOTES COMPUT SC, V4965, P489
[9]  
Cheng R, 2011, LECT NOTES COMPUT SC, V6980, P188, DOI 10.1007/978-3-642-24316-5_14
[10]   Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 [J].
Coron, Jean-Sebastien ;
Lee, Moon Sung ;
Lepoint, Tancrede ;
Tibouchi, Mehdi .
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT I, 2017, 10174 :41-58