Tamper Resistance Protection Of Logs Based On Forward-Secure

被引:0
|
作者
Wu, Zhiyong [1 ]
Bin ZhuGe [1 ]
Wang, Weiming [1 ]
机构
[1] Zhejiang Gongshang Univ, Inst Network & Commun Engn, Hangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
forward-secure; tamper resistance; Log;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Logs are important sources of the security audit systems, this paper analyzes the defects of traditional security audit systems, and proposes the forward-secure digital signature scheme as the tamper resistance protection of the server logs. Even if the signer's private key is divulged, the attacker can still not recover the plain message of the signcryption of this and past time, so he can not tamper the logs which are encrypted before key exposed. In this paper, we describes the scheme's theory and implementation. And we make simulation test and security analysis in detail. Finally, We come to the conclusion, the scheme can effectively resist any illegal tamper on historical logs.
引用
收藏
页码:90 / 94
页数:5
相关论文
共 50 条
  • [2] Forward-secure Public-Key Encryption Scheme with Tamper Evidence
    Jiang Han
    Xu QiuLiang
    Hou MengBo
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 656 - 659
  • [3] Forward-secure ID based digital signature scheme with forward-secure private key generator
    Oh, Hyunok
    Kim, Jihye
    Shin, Ji Sun
    INFORMATION SCIENCES, 2018, 454 : 96 - 109
  • [4] A forward-secure scheme based on secret sharing
    Zhang, Jing
    Wei, Feng
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1134 - 1138
  • [5] Forward-Secure Certificate-Based Encryption
    Lu, Yang
    Li, Jiguo
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 57 - 60
  • [6] Forward-Secure Distributed Encryption
    Lueks, Wouter
    Hoepman, Jaap-Henk
    Kursawe, Klaus
    PRIVACY ENHANCING TECHNOLOGIES, PETS 2014, 2014, 8555 : 123 - 142
  • [7] Forward-secure identity-based encryption scheme
    Yang, Hao-Miao
    Sun, Shi-Xin
    Li, Hong-Wei
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (03): : 534 - 537
  • [8] A Forward-Secure Certificate-Based Signature Scheme
    Li, Jiguo
    Teng, Huiyun
    Huang, Xinyi
    Zhang, Yichen
    Zhou, Jianying
    COMPUTER JOURNAL, 2015, 58 (04): : 853 - 866
  • [9] Forward-Secure Revocable Identity-Based Encryption
    Qin, Baodong
    Bai, Xue
    Zheng, Dong
    Cui, Hui
    Luo, Yiyuan
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 321 - 340
  • [10] Forward-Secure Encryption with Fast Forwarding
    Dodis, Yevgeniy
    Jost, Daniel
    Karthikeyan, Harish
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 3 - 32