A New Hash-Based Enhanced Privacy ID Signature Scheme

被引:0
|
作者
Chen, Liqun [1 ]
Dong, Changyu [2 ]
El Kassem, Nada [1 ]
Newton, Christopher J. P. [1 ]
Wang, Yalan [1 ]
机构
[1] Univ Surrey, Guildford, England
[2] Guangzhou Univ, Guangzhou, Peoples R China
关键词
Hash-based signatures; Enhanced Privacy ID; Signature-based revocation;
D O I
10.1007/978-3-031-62743-9_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The elliptic curve-based Enhanced Privacy ID (EPID) signature scheme is broadly used for hardware enclave attestation by many platforms that implement Intel Software Guard Extensions (SGX) and other devices. This scheme has also been included in the Trusted Platform Module (TPM) specifications and ISO/IEC standards. However, it is insecure against quantum attackers. While research into quantum-resistant EPID has resulted in several lattice-based schemes, Boneh et al. have initiated the study of EPID signature schemes built only from symmetric primitives. We observe that for this line of research, there is still room for improvement. In this paper, we propose a new hash-based EPID scheme, which includes a novel and efficient signature revocation scheme. In addition, our scheme can handle a large group size (up to 260 group members), which meets the requirements of rapidly developing hardware enclave attestation applications. The security of our scheme is proved under the Universal Composability (UC) model. Finally, we have implemented our EPID scheme, which, to our best knowledge, is the first implementation of EPID from symmetric primitives.
引用
收藏
页码:37 / 71
页数:35
相关论文
共 50 条
  • [31] An Enhanced ID-Based Anonymous Proxy Signature Scheme on Pairings
    Hu, Chengyu
    Liu, Pengtao
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 4, 2010, : 343 - 346
  • [32] A New ID-Based Threshold Group Signature Scheme
    Zhang, Zhiqiang
    Ye, Yunlong
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [33] A New ID-Based Proxy Blind Signature Scheme
    LANG Wei-min~1
    2. People’s Liberation Army Institute of Communications Command
    Wuhan University Journal of Natural Sciences, 2005, (03) : 555 - 558
  • [34] New ID-based proxy blind signature scheme
    Lang, Wei-Min
    Yang, Zong-Kai
    Cheng, Wen-Qing
    Tan, Yun-Meng
    Wuhan University Journal of Natural Sciences, 2005, 10 (03) : 555 - 558
  • [35] New Generic Attacks against Hash-Based MACs
    Leurent, Gaetan
    Peyrin, Thomas
    Wang, Lei
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 1 - 20
  • [36] SRFID: A hash-based security scheme for low cost RFID systems
    Khedr, Walid I.
    EGYPTIAN INFORMATICS JOURNAL, 2013, 14 (01) : 89 - 98
  • [37] A Latency-Optimized Hash-Based Digital Signature Accelerator for the Tactile Internet
    Pauls, Friedrich
    Wittig, Robert
    Fettweis, Gerhard
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, SAMOS 2019, 2019, 11733 : 93 - 106
  • [38] Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric Networks
    Bouk, Safdar H.
    Ahmed, Syed Hassan
    Kim, Dongkyun
    2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2014, : 765 - 766
  • [39] A secure searchable encryption scheme for cloud using hash-based indexing
    Andola, Nitish
    Prakash, Sourabh
    Yadav, Vijay Kumar
    Raghav
    Venkatesan, S.
    Verma, Shekhar
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2022, 126 : 119 - 137
  • [40] Hash-based and privacy-aware movie recommendations in a big data environment
    Shao, Tingting
    Chen, Xuening
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 13 (01) : 1 - 8