A New Hash-Based Enhanced Privacy ID Signature Scheme

被引:0
|
作者
Chen, Liqun [1 ]
Dong, Changyu [2 ]
El Kassem, Nada [1 ]
Newton, Christopher J. P. [1 ]
Wang, Yalan [1 ]
机构
[1] Univ Surrey, Guildford, England
[2] Guangzhou Univ, Guangzhou, Peoples R China
关键词
Hash-based signatures; Enhanced Privacy ID; Signature-based revocation;
D O I
10.1007/978-3-031-62743-9_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The elliptic curve-based Enhanced Privacy ID (EPID) signature scheme is broadly used for hardware enclave attestation by many platforms that implement Intel Software Guard Extensions (SGX) and other devices. This scheme has also been included in the Trusted Platform Module (TPM) specifications and ISO/IEC standards. However, it is insecure against quantum attackers. While research into quantum-resistant EPID has resulted in several lattice-based schemes, Boneh et al. have initiated the study of EPID signature schemes built only from symmetric primitives. We observe that for this line of research, there is still room for improvement. In this paper, we propose a new hash-based EPID scheme, which includes a novel and efficient signature revocation scheme. In addition, our scheme can handle a large group size (up to 260 group members), which meets the requirements of rapidly developing hardware enclave attestation applications. The security of our scheme is proved under the Universal Composability (UC) model. Finally, we have implemented our EPID scheme, which, to our best knowledge, is the first implementation of EPID from symmetric primitives.
引用
收藏
页码:37 / 71
页数:35
相关论文
共 50 条
  • [41] An Efficient Hash-Based Load Balancing Scheme to Support Parallel NIDS
    Kim, Nam-Uk
    Jung, Sung-Min
    Chung, Tai-Myoung
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2011, PT I, 2011, 6782 : 537 - 549
  • [42] Hash-based encryption system
    Peyravian, M
    Roginsky, A
    Zunic, N
    COMPUTERS & SECURITY, 1999, 18 (04) : 345 - 350
  • [43] Shorter hash-based signatures
    Pereira, Geovandro C. C. F.
    Puodzius, Cassius
    Barreto, Paulo S. L. M.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 : 95 - 100
  • [44] A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME
    Ming Yang Wang Yumin (State Key Lab of Integrated Service Network
    Journal of Electronics(China), 2008, (02) : 226 - 231
  • [45] Hash-based IP traceback
    Snoeren, AC
    Partridge, C
    Sanchez, LA
    Jones, CE
    Tchakountio, F
    Kent, ST
    Strayer, WT
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (04) : 3 - 14
  • [46] ID-based sanitizable signature data integrity auditing scheme with privacy-preserving
    Liu, Zhenpeng
    Ren, Lele
    Li, Ruilin
    Liu, Qiannan
    Zhao, Yonggang
    COMPUTERS & SECURITY, 2022, 121
  • [47] A new efficient ID-based proxy blind signature scheme
    Lang, WM
    Tan, YM
    Yang, ZK
    Liu, G
    Peng, B
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 407 - 411
  • [48] Hash-based Byzantine fault tolerant agreement with enhanced view consistency
    Saini, Poonam
    Singh, Awadhesh Kumar
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2014, 12 (02) : 152 - 168
  • [49] IoMT Privacy Preservation: A Hash-Based DCIWT Approach for Detecting Tampering in Medical Data
    Rupa, Ch.
    Arshiya Sultana, S. K.
    Pavana Malleswari, R.
    Dedeepya, Ch.
    Reddy Gadekallu, Thippa
    Song, Hyoung-Kyu
    Jalil Piran, Md
    IEEE ACCESS, 2024, 12 : 97298 - 97308
  • [50] A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme
    Kim, Minho
    Koc, Cetin Kaya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 157 - 160