Tamper Resistance Protection Of Logs Based On Forward-Secure

被引:0
|
作者
Wu, Zhiyong [1 ]
Bin ZhuGe [1 ]
Wang, Weiming [1 ]
机构
[1] Zhejiang Gongshang Univ, Inst Network & Commun Engn, Hangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
forward-secure; tamper resistance; Log;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Logs are important sources of the security audit systems, this paper analyzes the defects of traditional security audit systems, and proposes the forward-secure digital signature scheme as the tamper resistance protection of the server logs. Even if the signer's private key is divulged, the attacker can still not recover the plain message of the signcryption of this and past time, so he can not tamper the logs which are encrypted before key exposed. In this paper, we describes the scheme's theory and implementation. And we make simulation test and security analysis in detail. Finally, We come to the conclusion, the scheme can effectively resist any illegal tamper on historical logs.
引用
收藏
页码:90 / 94
页数:5
相关论文
共 50 条
  • [41] Forward-Secure Group Signatures from Lattices
    Ling, San
    Khoa Nguyen
    Wang, Huaxiong
    Xu, Yanhong
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 44 - 64
  • [42] Improvement of a Forward-Secure Ring Signature Scheme
    Wang Jian-dong
    Zou Hui
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1216 - 1218
  • [43] Tighter Reductions for Forward-Secure Signature Schemes
    Abdalla, Michel
    Ben Hamouda, Fabrice
    Pointcheval, David
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 292 - 311
  • [44] Forward-Secure Group Encryptions from Lattices
    Pan, Jing
    Chen, Xiaofeng
    Zhang, Fangguo
    Susilo, Willy
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 610 - 629
  • [45] Forward-secure multisignature and blind signature schemes
    Chow, SSM
    Hui, LCK
    Yiu, SM
    Chow, KP
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 895 - 908
  • [46] Some Aggregate Forward-Secure Signature Schemes
    Sunitha, N. R.
    Amberker, B. B.
    2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 1154 - +
  • [47] Forward-Secure Data Outsourcing Based on Revocable Attribute-Based Encryption
    Hoang, Van-Hoan
    Lehtihet, Elyes
    Ghamri-Doudane, Yacine
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1839 - 1846
  • [48] Forward-secure identity-based signature: Security notions and construction
    Yu, Jia
    Hao, Rong
    Kong, Fanyu
    Cheng, Xiangguo
    Fan, Jianxi
    Chen, Yangkui
    INFORMATION SCIENCES, 2011, 181 (03) : 648 - 660
  • [49] A Forward-Secure Threshold Signature Scheme Based on Multiplicative Secret Sharing
    Lu Dian-jun
    Li Xin-yan
    Wang Yun
    Zhang Bing-ru
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 476 - +
  • [50] Forward-secure threshold signature scheme based on polynomial secret sharing
    Lu, Dian-Jun
    Zhang, Bing-Ru
    Zhao, Hai-Xing
    Tongxin Xuebao/Journal on Communication, 2009, 30 (01): : 45 - 49