信息网络安全 ›› 2019, Vol. 19 ›› Issue (3): 81-86.doi: 10.3969/j.issn.1671-1122.2019.03.010

• • 上一篇    下一篇

一种针对El-Gamal数字签名生成的安全外包计算方案

赵谱1, 崔巍2, 郝蓉1(), 于佳1,3   

  1. 1.青岛大学计算机科学技术学院,山东青岛 266071
    2.科学技术部信息中心,北京100862
    3.中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
  • 收稿日期:2018-07-10 出版日期:2019-03-19 发布日期:2020-05-11
  • 作者简介:

    作者简介:赵谱(1995—),男,河南,硕士研究生,主要研究方向为云计算安全;崔巍(1982—),男,山东,高级工程师,博士,主要研究方向为网络安全、数字签名、云计算安全;郝蓉(1976—),女,山东,高级实验师,硕士,主要研究方向为信息安全;于佳(1976—),男,山东,教授,博士,主要研究方向为密码学、云计算安全、大数据安全、网络安全。

  • 基金资助:
    国家自然科学基金[61572267,61272425];“十三五”国家密码发展基金[MMJJ20170118];中国科学院信息工程研究所信息安全国家重点实验室开放课题[2016-MS-23,2017-MS-21]

A Secure Outsourcing Computation Scheme for El-Gamal Signature Generation

Pu ZHAO1, Wei CUI2, Rong HAO1(), Jia YU1,3   

  1. 1. College of Computer Science and Technology, Qingdao University, Qingdao Shandong 266071, China
    2. Information Center of the Ministry of Science and Technology, Beijing 100862, China
    3. State Key Laboratory of Information Security,Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Received:2018-07-10 Online:2019-03-19 Published:2020-05-11

摘要:

云计算作为一种新型计算模式,满足了人们将计算能力作为一种资源的需求。云服务器可以为资源受限的用户提供计算能力、存储空间等多方面的支持。完全可信的云服务器在实际应用中非常少见,不受信任的云服务器可能会窃取用户隐私。文章提出一种针对El-Gamal数字签名生成的安全外包计算方案,在云服务器的协助下,资源受限的签名者可以高效生成El-Gamal签名,且保护签名者的隐私不被泄露。该方案还包含验证机制,使签名者可以验证云服务器返回结果的正确性。理论分析证明,该方案可以在保护签名者隐私的前提下帮助签名者提高签名生成效率。

关键词: 安全外包计算, El-Gamal数字签名, 云计算安全

Abstract:

As a new computing mode, cloud computing has realized people’s requirement of computing power as a resource. Cloud servers can provide resource-constrained clients with much support, including computing power and storage space. But fully trusted servers are rare in practice. Untrusted servers may steal the privacy of the clients. This paper presents a secure outsourcing scheme for El-Gamal signature generation, which makes resource-constrained signers could efficiently generate El-Gamal signature with the help of cloud servers. Meanwhile, our scheme also provides privacy protection of signers. Our scheme also includes verification mechanism, which allows signer to check the correctness of result returned by the cloud server. The security analysis proves that our proposed scheme can help signers to improve signature generation efficiency under the premise of protecting signers’ privacy.

Key words: secure outsourcing computation, El-Gamal signature, cloud computing security

中图分类号: