高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

面向数据库审计日志的抗量子门限签名方案

陈大江 张奕文 焦丽华 汪白筝 陈瑞东

陈大江, 张奕文, 焦丽华, 汪白筝, 陈瑞东. 面向数据库审计日志的抗量子门限签名方案[J]. 电子与信息学报. doi: 10.11999/JEIT251320
引用本文: 陈大江, 张奕文, 焦丽华, 汪白筝, 陈瑞东. 面向数据库审计日志的抗量子门限签名方案[J]. 电子与信息学报. doi: 10.11999/JEIT251320
CHEN Dajiang, ZHANG Yiwen, JIAO Lihua, WANG Baizheng, CHEN Ruidong. A Quantum-Resistant Threshold Signature Scheme for Database Audit Logs[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251320
Citation: CHEN Dajiang, ZHANG Yiwen, JIAO Lihua, WANG Baizheng, CHEN Ruidong. A Quantum-Resistant Threshold Signature Scheme for Database Audit Logs[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251320

面向数据库审计日志的抗量子门限签名方案

doi: 10.11999/JEIT251320 cstr: 32379.14.JEIT251320
基金项目: 国家重点研发计划(No.2023YFB3106402),四川省自然科学基金资助项目(No.2024NSFJQ0030, No.24NSFSC1771)
详细信息
    作者简介:

    陈大江:男,副教授,研究方向为数据安全、物联网安全、可信人工智能

    张奕文:女,硕士生,研究方向为数据安全、物联网安全

    焦丽华:女,硕士生,研究方向为数据安全、可信人工智能

    汪白筝:男,硕士生,研究方向为数据安全、可信人工智能

    陈瑞东:男,副研究员,研究方向为数据安全、可信人工智能

    通讯作者:

    陈瑞东 crdchen@163.com

  • 中图分类号: TN918.1; TP309.7

A Quantum-Resistant Threshold Signature Scheme for Database Audit Logs

Funds: National Key Research and Development Program of China (No. 2023YFB3106402), Natural Science Foundation of Sichuan Province (No. 2024NSFJQ0030, No. 24NSFSC1771)
  • 摘要: 随着量子计算的迅猛发展,数据库审计日志中常用的RSA、ECDSA等经典数字签名机制因依赖大整数分解与离散对数等难题而在Shor算法下面临失效风险,同时Grover算法对哈希函数及对称密码的攻击复杂度降低也进一步削弱了现有审计机制的长期安全性。为提升审计日志在云计算与大数据环境中的完整性与可追溯能力,有必要构建能够抵御量子攻击的审计签名体系。为此,研究采用抗量子密码学原理,以FORS少次签名与XMSS-T树型结构为基础构建量子安全签名层,结合Shamir门限秘密共享机制实现私钥的安全分发与分布式管理,并利用链式哈希结构确保日志在存储与传输过程中的不可篡改性。安全性分析表明,该机制在量子随机预言机模型下满足不可伪造性与机密性要求,并具备抵御量子攻击的能力。实验结果进一步验证了体系在高并发日志场景下保持较低签名延迟与稳定吞吐率,且在不同日志规模与消息大小下表现出良好的扩展性,适用于大规模分布式数据库审计环境。
  • 图  1  系统工作流程图

    图  2  本文方案与对比算法在不同条件下的性能结果对比

    表  1  系统符号表

    符号含义
    $ {1}^{\lambda } $安全参数(后量子安全)
    $ p,q $大质数 (Shamir 域和哈希/输出长度控制)
    $ {Z}_{p} $Shamir 多项式运算的有限域
    $ G $基于椭圆曲线的循环群,阶为 $ q $
    $ P $循环群生成元
    msk密钥管理中心(KMC)主私钥
    mpkKMC 主公钥 $ \text{mpk}=\alpha P $
    $ \mathrm{s}{\mathrm{k}}_{\text{share,i}} $签名参与方第 $ i $ 个私钥分片
    $ \mathrm{p}{\mathrm{k}}_{\text{global}} $系统全局公钥, 由 XMSS-T 签名 FORS 公钥生成
    $ \text{LogChai}{\text{n}}_{i} $日志链节点,包括 $ {d}_{i}、{h}_{i-1}、{t}_{i} $
    $ {d}_{i} $日志具体审计数据
    $ {h}_{i} $日志链哈希值
    $ {t}_{i} $日志时间戳
    $ {\sigma }_{i} $节点签名,由 FORS+XMSS-T 生成
    $ {K}_{\text{enc}}{,K}_{\text{hash}} $对称加密和索引哈希密钥
    $ {H}_{1},{H}_{2},{H}_{3} $抗碰撞哈希函数, 用于身份验证、加密、签名验证
    PRF伪随机函数, 用于生成 FORS 叶节点私钥
    下载: 导出CSV

    表  2  不同日志规模下的签名性能数据(消息大小:1 KB,签名对所有日志)

    日志数方案签名数平均延迟 (ms)吞吐 (ops/s)最大/最小延迟 (ms)总耗时 (s)标准差(ms)
    10,000ECDSA100000.3143,2261.22/0.223.110.03
    10,000Dilithium100000.3922,5641.10/0.303.900.05
    10,000SPHINCS+100000.6551,5381.19/0.506.520.11
    10,000Our Scheme100000.4532,2222.92/0.104.500.25
    50,000ECDSA500000.3103,2261.55/0.2415.560.04
    50,000Dilithium500000.4192,4131.21/0.3120.720.06
    50,000SPHINCS+500000.7061,4296.04/0.5135.230.12
    50,000Our Scheme500000.4842,0833.20/0.1124.160.30
    100,000ECDSA1000000.3223,1251.88/0.2532.040.05
    100,000Dilithium1000000.4312,32612.10/0.3143.800.08
    100,000SPHINCS+1000000.7831,28211.40/0.5178.370.15
    100,000Our Scheme1000000.5511,8185.31/0.3855.720.78
    500,000ECDSA5000000.3392,9415.33/0.25170.820.13
    500,000Dilithium5000000.4852,08310.71/0.31240.160.22
    500,000SPHINCS+5000000.8481,17615.81/0.52425.190.41
    500,000Our Scheme5000000.7561,33330.09/0.10375.192.49
    1,000,000ECDSA10000000.3612,77712.11/0.26360.260.16
    1,000,000Dilithium10000000.5201,92316.32/0.31520.750.28
    1,000,000SPHINCS+10000000.8571,17620.78/0.51850.020.62
    1,000,000Our Scheme10000000.9521,05352.45/0.10950.424.98
    下载: 导出CSV

    表  3  本方案在不同消息大小下的性能对比(日志数量 =10 万条)

    消息大小平均延迟 (ms)吞吐率(ops/s)总时间 (s)最大/最小延迟 (ms)标准差 (ms)
    0.5 KB0.5221,92352.133.40/0.350.83
    1.0 KB0.5511,81855.725.31/0.380.78
    2.0 KB0.6191,66760.9810.47/0.430.91
    4.0 KB0.7501,33375.4312.61/0.552.54
    8.0 KB0.8241,22082.4115.48/0.603.17
    16.0 KB0.9561,05395.5620.06/0.755.42
    下载: 导出CSV
  • [1] ISLAM M S and RAHMAN M S. LogStamping: A blockchain-based log auditing approach for large-scale systems[EB/OL]. https://arxiv.org/abs/2505.17236, 2025.
    [2] 马金花, 黄欣沂, 许俊鹏, 等. 公开可审计的可修订签名方案[J]. 电子与信息学报, 2020, 42(5): 1079–1086. doi: 10.11999/JEIT190836.

    MA Jinhua, HUANG Xinyi, XU Junpeng, et al. Public accountable redactable signature scheme[J]. Journal of Electronics & Information Technology, 2020, 42(5): 1079–1086. doi: 10.11999/JEIT190836.
    [3] SERENGIL S and OZPINAR A. LightDSA: A python-based hybrid digital signature library and performance analysis of RSA, DSA, ECDSA and EdDSA in variable configurations, elliptic curve forms and curves[EB/OL]. https://arxiv.org/abs/2505.23773, 2025.
    [4] BARRAL D, CARDAMA J, DÍAZ-CAMACHO G, et al. Review of distributed quantum computing: From single QPU to high performance quantum computing[J]. Computer Science Review, 2025, 57: 100747. doi: 10.1016/j.cosrev.2025.100747.
    [5] CHEN Lidong, JORDAN S P, LIU Yikai, et al. Report on post-quantum cryptography[R]. Gaithersburg, MD, USA: National Institute of Standards and Technology, 2016.
    [6] JOSEPH D, MISOCZKI R, MANZANO M, et al. Transitioning organizations to post-quantum cryptography[J]. Nature, 2022, 605(7909): 237–243. doi: 10.1038/s41586-022-04623-2.
    [7] AIKATA A, MERT A C, IMRAN M, et al. KaLi: A crystal for post-quantum security using Kyber and Dilithium[J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 2023, 70(2): 747–758. doi: 10.1109/TCSI.2022.3219555.
    [8] JACKSON K A, MILLER C A, and WANG Daochen. Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model[C]. Proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Zurich, Switzerland, 2024: 418–446. DOI: 10.1007/978-3-031-58751-1_15.
    [9] 严迎建, 常雅静, 朱春生, 等. 基于循环密文的格密码模板攻击方法[J]. 电子与信息学报, 2023, 45(12): 4530–4538. doi: 10.11999/JEIT221164.

    YAN Yingjian, CHANG Yajing, ZHU Chunsheng, et al. A lattice cipher template attack method based on recurrent cryptography[J]. Journal of Electronics & Information Technology, 2023, 45(12): 4530–4538. doi: 10.11999/JEIT221164.
    [10] BUCHMANN J, DAHMEN E, and HÜLSING A. XMSS-a practical forward secure signature scheme based on minimal security assumptions[C]. Proceedings of the 4th International Workshop on Post-Quantum Cryptography, Taipei, China, 2011: 117–129. doi: 10.1007/978-3-642-25405-5_8.
    [11] BERNSTEIN D J, HOPWOOD D, HÜLSING A, et al. SPHINCS: Practical stateless hash-based signatures[C]. Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Sofia, Bulgaria, 2015: 368–397. doi: 10.1007/978-3-662-46800-5_15.
    [12] YASUDA T and SAKURAI K. A multivariate encryption scheme with rainbow[C]. Proceedings of the 17th International Conference on Information and Communications Security, Beijing, China, 2015: 236–251. doi: 10.1007/978-3-319-29814-6_19.
    [13] BERNSTEIN D J. Post-quantum cryptography[M]. JAJODIA S, SAMARATI P, YUNG M. Encyclopedia of Cryptography, Security and Privacy. Cham, Switzerland: Springer, 2025: 1846–1847. doi: 10.1007/978-3-030-71522-9_386.
    [14] BORGES F, REIS P R, and PEREIRA D. A comparison of security and its performance for key agreements in post-quantum cryptography[J]. IEEE Access, 2020, 8: 142413–142422. doi: 10.1109/ACCESS.2020.3013250.
    [15] GUR K D, KATZ J, and SILDE T. Two-round threshold lattice-based signatures from threshold homomorphic encryption[C]. Proceedings of the 15th International Workshop on Post-Quantum Cryptography, Oxford, UK, 2024: 266–300. Doi: 10.1007/978-3-031-62746-0_12.
    [16] 李凤华, 李晖, 牛犇, 等. 数据要素流通与安全的研究范畴与未来发展趋势[J]. 通信学报, 2024, 45(5): 1–11. DOI: 10.11959/j.issn.1000-436x.2024106.

    LI Fenghua, LI Hui, NIU Ben, et al. Research category and future development trend of data elements circulation and security[J]. Journal on Communications, 2024, 45(5): 1–11. DOI: 10.11959/j.issn.1000-436x.2024106. [17] HUELSING A, BUTIN D, GAZDAG S, et al. XMSS: eXtended Merkle signature scheme[R]. RFC 8391, 2018. (查阅网上资料,本条文献包含两条文献,请确认).
    [17] BUCHMANN J, DAHMEN E, and HÜLSING A. XMSS-a practical forward secure signature scheme based on minimal security assumptions[C]. Proceedings of the 4th International Workshop on Post-Quantum Cryptography, Taipei, China, 2011: 117–129. doi: 10.1007/978-3-642-25405-5_8. (查阅网上资料,本条文献与第10条文献重复,请确认).
  • 加载中
图(2) / 表(3)
计量
  • 文章访问数:  20
  • HTML全文浏览量:  10
  • PDF下载量:  1
  • 被引次数: 0
出版历程
  • 修回日期:  2026-03-24
  • 录用日期:  2026-03-24
  • 网络出版日期:  2026-04-19

目录

    /

    返回文章
    返回