期刊文献+

标准模型下的无证书代理环签名方案 被引量:3

Certificateless Proxy Ring Signature Scheme in Standard Model
在线阅读 下载PDF
导出
摘要 由于无证书公钥密码体制是一种新型公钥密码体制,它既克服了密钥托管问题,又不需要使用公钥证书,而在标准模型下所构造的方案与在随机语言模型下所构造的方案相比,具有更高的可证安全性,因此,该文在标准模型下,提出了一个无证书代理环签名方案。与现有的代理环签名方案相比,它具有更高的执行效率和可证安全性,能够归约于CDH(computational diffie-Hellman)问题假定。分析结果表明:它既能有效抵制来自密钥生成中心和授权人的伪造攻击,又能满足代理环签名的其他安全性需求;并且,该方案具有更高的执行效率,只需要两次对运算。 Since certificateless public key cryptography (CL-PKC for short) is a new type of public key cryptography, it eliminates the key escrow problem and the need for public key certificate. And the scheme in the standard model has more provable security than the scheme in the random oracle model (ROM). So, it shows a certificateless proxy ring signature scheme in a standard model. Compared with the current proxy ring signature scheme, have the higher computing speed and more provable security, and have a security reduction to CDHP assumption. The analysis shows that it can resist forgery attacks from the secret key generation center and the original signer, and can satisfy the security requirements of a proxy ring signature scheme;meanwhile the computational efficiency is improved, the scheme only needs two bilinear parings.
出处 《计算机技术与发展》 2012年第11期235-238,242,共5页 Computer Technology and Development
基金 安徽省自然科学基金(KJ2011B077)
关键词 无证书公钥密码体制 标准模型 环签名 代理签名 伪造攻击 certificateless public key cryptography standard model ring signature proxy signature forgery attack
作者简介 张春生(1968-),男,硕士,主要研究方向为网络与信息安全;姚绍文,博士,教授,博士生导师,主要研究方向为网络协议工程、网络分布式计算。
  • 相关文献

参考文献16

  • 1Boneh D, Boyen X. Secure identity-based encryption without random oracles[ C]//Proc. of the Advances in Cryptology- CRYPTO. Berlin: Springer-Verlag ,2004:443 -459.
  • 2Waters B. Efficient identity-based encryption without random oracles[ C ]//Advances in Cryptology- EUROCRYPT 2005. Berlin : Springer-Verlag ,2005 : 114-127.
  • 3谷科,贾维嘉,姜春林.高效安全的基于身份的签名方案[J].软件学报,2011,22(6):1350-1360. 被引量:17
  • 4Paterson K G, Schuldt J C N, Efficient identity-based signa- tures secure in the standard model[ C ]//Proc. of the ACISP 2006. Berlin : Spfinger-Verlag ,2006:207-222.
  • 5AI-Riyami S S,Paterson K G. Certificateless public key cryp- tography [ C ]//Proc. of the AS1ACRYPT 2003. Berlin: Springer-Verlag,2003:452-473.
  • 6Shamir A. Identity-based cryptosystems and signature sche- mes [ C ]//Proceedings of Crypto 1984. Berlin : Springer Ver- lag, 1985:47-53.
  • 7Hu B, Wong D, Zhang F, et al. Key replacement attack against a generic construction of certificate|ess signature [ C ]//Ad- vances in ACISP 2006, Lecture Notes in Computer Science. Berlin : Springer-Verlag ,2006:235 -246.
  • 8Yap W, Heng S, Goi B. An efficient certificateless signature scheme [ C ]//Proc. of EUC Workshop 2006, Lecture Notes in Computer Science. Berlin : [ s. n. ] ,2006 : 322-331.
  • 9Rivest R L,Shamir A,Tauman Y. How to Leak a Secret 17th International Conference on the Theory and Application of Cryptology and Information Security[ C]//LNCS 2248. Ber- lin : Springer- Verlag ,2001:552-565.
  • 10Mambo M, Usuda K, Okamoto E. Proxy Signatures : Delegationof the Power to Sign Messages [ J ]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1996,79 ( 9 ) : 1338-1354.

二级参考文献52

共引文献34

同被引文献20

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部