新型安全并发签名设计

IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS
S. Liaw, E. Lu, H. Chang, Pin-Chang Su
{"title":"新型安全并发签名设计","authors":"S. Liaw, E. Lu, H. Chang, Pin-Chang Su","doi":"10.6138/JIT.2018.19.6.20160902","DOIUrl":null,"url":null,"abstract":"The rapid growth of the Internet has accelerated e-commerce application development. Numerous problems involving Internet trade transaction security remain. Therefore, security and transaction fairness establishment in e-commerce applications is a crucial research topic. A fair exchange protocol enables users to securely obtain information from each other. This has become a widely applied research topic in e-commerce. A concurrent signature eliminates the need for a trusted third party (TTP) or substantial mutual communication between two parties, to provide fair exchange protocol with e-commerce ideas. The concurrent signature concept was proposed by Chen et al. in 2004 EUROCRYPT. Some researchers improved the concurrent signature susceptibility to the message substitution attack defect, but there are still identify authentication and information exchange procedure security issues. This paper proposes a concurrent signature scheme based on elliptic curve cryptography (ECC) that uses the same security strength shorter key length, reduces public storage costs and the calculation and management risks. We strengthen the identity authentication mechanisms to prevent the counterfeiting identity attacks and provide a more confidential protocol through a self-certified mechanism.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"19 1","pages":"741-751"},"PeriodicalIF":0.9000,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"New Security Concurrent Signature Design\",\"authors\":\"S. Liaw, E. Lu, H. Chang, Pin-Chang Su\",\"doi\":\"10.6138/JIT.2018.19.6.20160902\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid growth of the Internet has accelerated e-commerce application development. Numerous problems involving Internet trade transaction security remain. Therefore, security and transaction fairness establishment in e-commerce applications is a crucial research topic. A fair exchange protocol enables users to securely obtain information from each other. This has become a widely applied research topic in e-commerce. A concurrent signature eliminates the need for a trusted third party (TTP) or substantial mutual communication between two parties, to provide fair exchange protocol with e-commerce ideas. The concurrent signature concept was proposed by Chen et al. in 2004 EUROCRYPT. Some researchers improved the concurrent signature susceptibility to the message substitution attack defect, but there are still identify authentication and information exchange procedure security issues. This paper proposes a concurrent signature scheme based on elliptic curve cryptography (ECC) that uses the same security strength shorter key length, reduces public storage costs and the calculation and management risks. We strengthen the identity authentication mechanisms to prevent the counterfeiting identity attacks and provide a more confidential protocol through a self-certified mechanism.\",\"PeriodicalId\":50172,\"journal\":{\"name\":\"Journal of Internet Technology\",\"volume\":\"19 1\",\"pages\":\"741-751\"},\"PeriodicalIF\":0.9000,\"publicationDate\":\"2018-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Internet Technology\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.6138/JIT.2018.19.6.20160902\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Internet Technology","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.6138/JIT.2018.19.6.20160902","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 1

摘要

互联网的快速发展加速了电子商务应用的发展。涉及网络贸易交易安全的问题很多。因此,建立电子商务应用中的安全性和交易公平性是一个重要的研究课题。公平的交换协议使用户能够安全地从彼此获取信息。这已经成为电子商务中应用广泛的研究课题。并发签名消除了可信第三方(TTP)或双方之间实质性的相互通信的需要,为电子商务思想提供公平的交换协议。并发签名概念由Chen等人在2004年EUROCRYPT提出。一些研究人员改进了并发签名易受消息替代攻击的缺陷,但仍然存在识别认证和信息交换过程的安全问题。本文提出了一种基于椭圆曲线密码(ECC)的并发签名方案,该方案具有相同的安全强度和较短的密钥长度,降低了公共存储成本和计算管理风险。我们加强身份认证机制,防止伪造身份攻击,并通过自我认证机制提供更机密的协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
New Security Concurrent Signature Design
The rapid growth of the Internet has accelerated e-commerce application development. Numerous problems involving Internet trade transaction security remain. Therefore, security and transaction fairness establishment in e-commerce applications is a crucial research topic. A fair exchange protocol enables users to securely obtain information from each other. This has become a widely applied research topic in e-commerce. A concurrent signature eliminates the need for a trusted third party (TTP) or substantial mutual communication between two parties, to provide fair exchange protocol with e-commerce ideas. The concurrent signature concept was proposed by Chen et al. in 2004 EUROCRYPT. Some researchers improved the concurrent signature susceptibility to the message substitution attack defect, but there are still identify authentication and information exchange procedure security issues. This paper proposes a concurrent signature scheme based on elliptic curve cryptography (ECC) that uses the same security strength shorter key length, reduces public storage costs and the calculation and management risks. We strengthen the identity authentication mechanisms to prevent the counterfeiting identity attacks and provide a more confidential protocol through a self-certified mechanism.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Internet Technology
Journal of Internet Technology COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
3.20
自引率
18.80%
发文量
112
审稿时长
13.8 months
期刊介绍: The Journal of Internet Technology accepts original technical articles in all disciplines of Internet Technology & Applications. Manuscripts are submitted for review with the understanding that they have not been published elsewhere. Topics of interest to JIT include but not limited to: Broadband Networks Electronic service systems (Internet, Intranet, Extranet, E-Commerce, E-Business) Network Management Network Operating System (NOS) Intelligent systems engineering Government or Staff Jobs Computerization National Information Policy Multimedia systems Network Behavior Modeling Wireless/Satellite Communication Digital Library Distance Learning Internet/WWW Applications Telecommunication Networks Security in Networks and Systems Cloud Computing Internet of Things (IoT) IPv6 related topics are especially welcome.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信