A New Hash-Based Enhanced Privacy ID Signature Scheme

被引:0
|
作者
Chen, Liqun [1 ]
Dong, Changyu [2 ]
El Kassem, Nada [1 ]
Newton, Christopher J. P. [1 ]
Wang, Yalan [1 ]
机构
[1] Univ Surrey, Guildford, England
[2] Guangzhou Univ, Guangzhou, Peoples R China
关键词
Hash-based signatures; Enhanced Privacy ID; Signature-based revocation;
D O I
10.1007/978-3-031-62743-9_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The elliptic curve-based Enhanced Privacy ID (EPID) signature scheme is broadly used for hardware enclave attestation by many platforms that implement Intel Software Guard Extensions (SGX) and other devices. This scheme has also been included in the Trusted Platform Module (TPM) specifications and ISO/IEC standards. However, it is insecure against quantum attackers. While research into quantum-resistant EPID has resulted in several lattice-based schemes, Boneh et al. have initiated the study of EPID signature schemes built only from symmetric primitives. We observe that for this line of research, there is still room for improvement. In this paper, we propose a new hash-based EPID scheme, which includes a novel and efficient signature revocation scheme. In addition, our scheme can handle a large group size (up to 260 group members), which meets the requirements of rapidly developing hardware enclave attestation applications. The security of our scheme is proved under the Universal Composability (UC) model. Finally, we have implemented our EPID scheme, which, to our best knowledge, is the first implementation of EPID from symmetric primitives.
引用
收藏
页码:37 / 71
页数:35
相关论文
共 50 条
  • [1] Tuning the Winternitz hash-based digital signature scheme
    Perin, Lucas Pandolfo
    Zambonin, Gustavo
    Beppler Martins, Douglas Marcelino
    Custodio, Ricardo
    Martina, Jean Everson
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 542 - 547
  • [2] A Server-Assisted Hash-Based Signature Scheme
    Buldas, Ahto
    Laanoja, Risto
    Truu, Ahto
    SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 3 - 17
  • [3] A Blockchain-Assisted Hash-Based Signature Scheme
    Buldas, Ahto
    Laanoja, Risto
    Truu, Ahto
    SECURE IT SYSTEMS, 2018, 11252 : 138 - 153
  • [4] An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection
    Shen, Jian
    Tan, Haowen
    Zheng, Yuhui
    Ji, Sai
    Wang, Jin
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 2070 - 2079
  • [5] Hash-based signature revisited
    Lingyun Li
    Xianhui Lu
    Kunpeng Wang
    Cybersecurity, 5
  • [6] Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme
    Nie, Xuyun
    Xu, Zhaohu
    Buchmann, Johannes
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2013, 2013, 7932 : 155 - 164
  • [7] BAHS: A Blockchain-Aided Hash-Based Signature Scheme
    Wang, Yalan
    Chen, Liqun
    Meng, Long
    Tian, Yangguang
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 419 - 439
  • [8] A Hash-Based Quantum-Resistant Chameleon Signature Scheme
    Thanalakshmi, P.
    Anitha, R.
    Anbazhagan, N.
    Cho, Woong
    Joshi, Gyanendra Prasad
    Yang, Eunmok
    SENSORS, 2021, 21 (24)
  • [9] Hash-based signature revisited
    Li, Lingyun
    Lu, Xianhui
    Wang, Kunpeng
    CYBERSECURITY, 2022, 5 (01)
  • [10] A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme
    Thanalakshmi, P.
    Anitha, R.
    Anbazhagan, N.
    Park, Chulho
    Joshi, Gyanendra Prasad
    Seo, Changho
    MATHEMATICS, 2022, 10 (10)