期刊文献+

m-挠群上一种基于身份的聚合签名方案 被引量:3

An ID-based aggregate signature scheme from m-torsion groups
在线阅读 下载PDF
导出
摘要 以Cha和Cheon给出的基于身份的签名方案为基础,在椭圆曲线中的m挠群上给出一种基于身份的聚合签名方案,并证明该方案在随机预言模型下是安全的.因为m挠群和基础方案都具有一些良好的性质,所以该方案与基础方案一样简单有效.基于身份的聚合签名方案的提出为验证人员对多个基于身份的签名(这些签名是多个用户分别用自己的身份对多个不同的消息进行签名所得)进行一次性验证提供了方便. Based on the ID-based signature scheme given by Cha and Cheon, we propose an ID-based aggregate signautre scheme from m-torsion groups of elliptic curves. It is provably secure in the random oracle model. Due to the nice properties of m-torsion groups and the base scheme, it turns out that our scheme is as efficient as the base scheme. An ID-based aggregate signature provides the one-time verification of many different ID-based signautres on many diferent messages by many users.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2005年第3期427-431,共5页 Journal of Xidian University
基金 国家重点基础研究发展规划(973)资助项目(G1999035803) 国家自然科学基金资助项目(60373104)
关键词 聚合签名 基于身份的签名 WEIL对 m-挠群 GDH群 aggregate signature ID-based signature Weil pairing m-torsion group GDH group
  • 相关文献

参考文献1

二级参考文献4

  • 1Blakley G R. Safeguarding Cryptographic Keys[A]. Proc AFIPS 1979, National Computer Conference[C]. New Jersey: AFIPS Press,1979. 313-317.
  • 2Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22( 11 ) : 612-613.
  • 3Brickell E F. Some Ideal Secret Sharing Schemes[A]. Advancec in Cryptology-EUROCRYPT'89 Proceedings[C]. Berlin: Springer Verlag, 1990. 468-475.
  • 4Gennaro R, Jarecki S, Krawczyk H, et al. Robust and Effcient Sharing of RSA Functions[A]. Advanced in Cayptology-CRYPTO'96 Proceedings[C]. Berlin: Springer Verlag, 1996. 157-172.

共引文献3

同被引文献34

  • 1王彪,杨小东,黄海宁.一种基于Weil配对的群签名方案[J].北京邮电大学学报,2006,29(z2):133-135. 被引量:1
  • 2Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]//LNCS 2656:Advances in Cryptology-Eurocrypt' 03.Berlin : Springer-Verlag, 2003 : 416-432.
  • 3ShamirA.Identity-based cryptosystems and signature schemes[C]// LNCS 196:Advances in Cryptology-Crypto'84.Berlin:Springer-Verlag, 1985:47-53.
  • 4Boneh D,Franklin M,Identity-based encryption from the Weil pairing[C]//LNCS 2139 : Advances in Cryptology-Crypto' 2001.Berlin : Springer-Verlag, 2001 : 213-229.
  • 5Choon Jae Cha,Cheon Jung Hee.An identity-based signature from gap Diffie-Hellman groups[C]//LNCS2567:Public Key Cryptography- PKC 2003.Berlin : Springer-Verlag, 2003 : 18-30.
  • 6Yi Xun.An identity-based signature scheme from the Weil pairing[J]. IEEE Communications Letters,2003,7(2):76-78.
  • 7Li Jin, Kim K, Zhang Fang-guo, et al. Aggregate Proxy Signa- ture and Verifiably Encrypted Proxy Signature[C]//Proc, of In ternational Conference on Provable Security 2007. Berlin Springer-Veralg, 2007:208-217.
  • 8Mu Yi, Susilo W, Zhu Hua-fei. Compact Sequential Aggregate Signatures[C]//Proc. of the 22th Annual ACM Symposium on Applied Computing. Seoul, Korea, 2007 :249-253.
  • 9Wen Yiling, Ma Jian-feng. An Aggregate Signature Scheme with Constant Pairing Operations[C]//Proc. of the 2008 International Conference on Computer Science and Software Engineering. 2008,3 : 830-833.
  • 10Zhang Fang-guo, Safavi-Naini R, Susilo W. An Efficient Signa- ture Scheme from Bbilinear Pairings and Its Applications[C]// Proc. of the 7th International Conference on Practice and Theory in Public Key Cryptography 2004. Berlin: Springer-Veralg, 2004: 277-290.

引证文献3

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部