针对可信移动平台(Trusted Mobile Platform,TMP)远程认证方式中直接匿名证明方案存在的性能瓶颈、R攻击以及跨信任域问题,提出了一种新型的具有用户可控关联性的匿名证明(Anonymous Attestation with User-controlled-linkability,TMP-UAA)方案.通过引入可信第三方CA构建了方案的模型,该模型可以有效解决传统直接匿名证明设计中存在的R攻击和跨信任域问题,且易于部署实现.根据提出的方案模型,首先利用Paillier加密系统及可验证加密技术设计了一个安全两方计算协议,该协议用于实现TPM-UAA方案中的Join协议;其次运用该协议并结合提出的l-MSDH假设和XDH假设给出了方案的具体设计;然后在随机预言模型下对方案的安全性进行了证明,证明表明该方案满足用户可控匿名性以及用户可控可追踪性;此外在性能方面与现有直接匿名证明方案相比,该方案具有更短的签名长度以及更高的计算效率;最后阐述了TPM-UAA方案在可信移动环境下的跨域证明,该证明避免了传统直接匿名证明存在的跨信任域及R攻击问题.
隐私集合交集(Private Set Intersection, PSI)协议是一种具有重要实际意义的安全多方计算协议,广泛应用于多方私有输入集合求交集的场景。阈值多方PSI协议作为PSI协议的一种灵活形式,能够适应更多复杂场景。本文给出了一种一次的云辅助阈值多方PSI模型(Cloud-assisted Threshold Multi-party Private Set Intersection, CTMPSI),旨在优化发送方在资源受限场景下的性能。该协议通过引入云服务器辅助计算,显著降低了发送方的计算和通信开销,同时在半诚实模型下确保了输入集合元素的隐私性。此外,CTMPSI实现了发送方上传加密数据后即可离线的功能,进一步提升了协议的实用性。本文详细描述了CTMPSI协议的设计框架和性能评估。实验结果表明,在不平衡输入集合场景中,CTMPSI协议相较于现有的多方PSI协议,在性能上取得了显著提升。该协议为资源受限场景下的阈值多方PSI应用提供了高效且安全的解决方案,具有重要的理论价值和实际意义。Private Set Intersection (PSI) protocol is a secure multi-party computation protocol with significant practical applications, widely used in scenarios where multiple parties need to compute the intersection of their private input sets. As a flexible variant of PSI, threshold multi-party PSI can adapt to more complex scenarios. This paper proposes a one-round cloud-assisted threshold multi-party PSI model (Cloud-assisted Threshold Multi-party Private Set Intersection, CTMPSI), aiming to optimize the performance of senders in resource-constrained scenarios. By introducing cloud server-assisted computation, the protocol significantly reduces the computational and communication overhead for senders while ensuring the privacy of input set elements in the semi-honest model. Additionally, CTMPSI enables senders to go offline after uploading encrypted data, further enhancing the practicality of the protocol. This paper provides a detailed description of the design f
随着工业4.0的快速发展,云边端协同范式(CET)通过整合云端、边缘节点与终端设备显著提升了计算资源利用效率,但其隐私认证机制面临中心化依赖与资源受限的双重挑战。本文提出一种面向工业CET的轻量级去中心化隐私认证方案,旨在实现低开销、高安全性的认证机制。通过区块链跨链架构建立去中心化信任连接,方案在消除传统权威机构(TA)依赖的同时,采用有限次双线性配对与模指数运算优化计算开销。实验结果表明,隐私认证的计算开销为毫秒级,通信代价保持在低字节位,满足工业场景的轻量化需求。方案进一步满足匿名性、不可伪造性、可追溯性等安全需求,为大规模工业设备接入场景提供了高效可靠的隐私认证解决方案。With the rapid advancement of Industry 4.0, the cloud-edge-terminal (CET) collaborative paradigm significantly enhances computational resource utilization through cloud-edge-terminal integration, yet its privacy authentication mechanisms face dual challenges of centralized dependencies and resource constraints. This paper proposes a lightweight decentralized privacy-preserving authentication scheme for industrial CET environments, aiming to achieve low-overhead and high-security authentication. By establishing decentralized trust connections via a blockchain cross-chain architecture, the scheme eliminates reliance on traditional trusted authorities (TAs) while optimizing computational costs through limited bilinear pairing operations and modular exponentiation optimizations. Experimental results demonstrate that the privacy authentication achieves millisecond-level computational latency and maintains communication costs within a low-byte range, fulfilling the lightweight requirements of industrial scenarios. The scheme further satisfies critical security properties including anonymity, unforgeability, and traceability, providing an efficient and reliable privacy authentication solution for large-sc
随着当前加密货币行业的发展,安全数字签名的必要性也成比例地增长。数字签名能够有效提高工作效率,降低交易成本,提升信息安全,因此在全球范围内得到了广泛的应用。数字签名是一种基于公钥密码学的技术,用于确认数字信息的完整性、身份认证和防伪造性。传统数字签名技术在应对多方协作、时间敏感任务等复杂场景时存在显著局限性,难以满足现代分布式系统对安全性、效率与灵活性的高要求。为此,研究者结合定时密码学与分布式签名技术,提出了基于时间锁谜题的门限代理签名方案。With the current development of the cryptocurrency industry, the necessity of secure digital signatures has grown proportionally. Digital signatures can effectively enhance work efficiency, reduce transaction costs, and improve information security, thus being widely applied globally. Digital signatures are a technology based on public key cryptography, used to confirm the integrity of digital information, authenticate identities, and prevent forgery. Traditional digital signature technologies have significant limitations when dealing with complex scenarios such as multi-party collaboration and time-sensitive tasks, and are difficult to meet the high requirements of modern distributed systems for security, efficiency, and flexibility. Therefore, researchers have combined timed cryptography and distributed signature technology to propose a threshold proxy signature scheme based on time-lock puzzles.
随着信息技术的快速发展,数据安全和用户的隐私越发受到重视。本文提出了一种匿名认证密钥交换(Anonymous Key Exchange, AKE)协议,旨在为医疗场景下的医疗数据共享和患者身份隐私提供安全和隐私的保护。该方案通过使用累加器、零知识证明和关联数据加密等技术,实现用户匿名的认证和安全的会话密钥协商,有效防止敌手对于用户和医用物联网设备的攻击,还能抵御诚实且好奇的医疗机构对患者身份的猜测。相较于现有的方案提供了更强的隐私安全保护,并且很好地平衡了性能和安全性,具有重要的理论价值和意义。With the rapid development of information technology, data security and user privacy have been paid more and more attention. This paper proposes an Anonymous authenticated Key Exchange (AKE) protocol to provide security and privacy protection for medical data sharing and patient identity privacy in medical scenarios. By using accumulator, zero-knowledge proof and associated data encryption technology, the scheme realizes anonymous user authentication and secure session key agreement, which effectively prevents adversaries from attacking users and medical IoT devices, and can resist honest and curious medical institutions from guessing the patient’s identity. Compared with the existing schemes, it provides stronger privacy security protection, and a good balance between performance and security, which has important theoretical value and significance.