期刊文献+

一种新的无证书聚合签名 被引量:13

New certificateless aggregate signature scheme
在线阅读 下载PDF
导出
摘要 提出了一种新的基于双线性对的无证书聚合签名方案。在随机预言机模型下,基于计算Diffie-Hellman困难问题假设,证明了新方案在AⅠ攻击者的公钥替换攻击和AⅡ攻击者的KGC攻击下是存在不可伪造的。分析结果表明,在计算效率方面,新方案的验证只需要三个对运算,不仅较已有聚合签名方案在效率上更具优势,而且满足聚合签名要求的所有性质。 This paper proposed a new certificateless aggregate signature based on bilinear pairings. The proposed scheme was proved to be existential unforgeable against type Ⅰ and type Ⅱ adaptively chose message and identity attacks in the random oracle model. In the sign and verification algorithm,the scheme only needs three pairing computation and it meets all the properties of an aggregate signature,thus it is more efficient than the known schemes in terms of computation.
出处 《计算机应用研究》 CSCD 北大核心 2014年第8期2485-2487,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(61202191 61003245)
关键词 无证书公钥密码体制 随机预言机模型 聚合签名 双线性对 certificateless public key cryptography random oracle model aggregate signature bilinear pairing
作者简介 喻绣瑛(1976-),女,四川成都人,讲师,博士研究生,主要研究方向为密码学、信息安全(xyyu@swjtu.edu.cn); 何大可(1944-),男,教授,博导,主要研究方向为密码学、信息安全.
  • 相关文献

参考文献10

  • 1AL-RIYAMI S S,PATERSON K. Certificateless public key cryptogra- phy[ C ]//Proc of ASIACRYPT. 2003:452-473.
  • 2张福泰,孙银霞,张磊,耿曼曼,李素娟.无证书公钥密码体制研究[J].软件学报,2011,22(6):1316-1332. 被引量:52
  • 3陈明,吴开贵,何盼.一种新的无证书签密方案[J].计算机应用研究,2011,28(10):3799-3802. 被引量:5
  • 4BONEH D,GENTRY C, LYNN B, et al. Aggregate and verifiably en- crypted signatures from bilinear maps [ C ]//Proc of the 22nd Interna- tional Conference on Theory and Applications of Cryptographic Tech- niques. Berlin : Springer-Verlag ,2003:416-432.
  • 5GONG Zheng, LONG Yu, HONG Xuan,et al. Two certificateless ag- gregate signatures from bilinear maps [ C ]//Proc of the 8th ACIS In- ternational Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. Washington DC: IEEE Computer Society,2007 : 188-193.
  • 6ZHANG Lei,ZHANG Fu-tai. A new certificateless aggregate signature scheme [J]. Computer Communications, 2009, 32 ( 6 ) : 1079- 1085.
  • 7ZHANG Lei, QIN Bo, WU Qian-hong,et al. Efficient many-to-one au- thentication with certificateless aggregate signatures [ J ]. Computer Networks ,2010,54(14) :2482-2491.
  • 8XIONG Hu, GUAN Zhi, CHEN Zhong, et al. An efficient certificate- less aggregale signature with constant pairing computations[ J ]. Infor- mation Science ,2013,219(10) :225-235.
  • 9SHEN Li-min, SUN Yin-xia. On the security of a certificateless aggre- gate signature scheme[ J ]. International Journal of Advancements in Computing Technology,2013,5( 3 ) :358-367.
  • 10杜红珍,黄梅娟,温巧燕.高效的可证明安全的无证书聚合签名方案[J].电子学报,2013,41(1):72-76. 被引量:38

二级参考文献23

  • 1CAO Chunjie,MA Jianfeng,MOON Sangjae.Provable Efficient Certificateless Group Key Exchange Protocol[J].Wuhan University Journal of Natural Sciences,2007,12(1):41-45. 被引量:8
  • 2李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 3BONEH D, FRANKLIN M K. Identity-based encryption from the weil pairing[ C ]//Proc of CRYPTO. Berlin: Springer-Verlag, 2001 : 213- 229.
  • 4MALONE-LEE J. Identity-based signcryption, Cryptology ePrint Ar- chive,2002/098 [ R/OL ]. ( 2002-07-19 ). http :// eprint, iacr. org/ 2002/098.
  • 5BOYEN X. Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography [ C ]//Proc of CRYPTO. Berlin: Springer-Vedag,2003:383-399.
  • 6YU Yong, YANG Bo, SUN Ying, et al. Identity based signcryption scheme without random oracles [ J ]. Computer Standard & Inter- faces ,2009,31 ( 1 ) : 56-62.
  • 7AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptog- raphy [ C ]//Advances in Cryptology, vol 2894. Berlin: Springer-Ver- lag,2003:452-473.
  • 8LIU Zhen-hua, HU Yu-pu, ZHANG Xiang-son, et al. Certificateless signcryption scheme in the standard model [ J ]. Information Sciences ,2010,180 ( 1 ) :452- 464.
  • 9SHACHAM H. New paradigms in signature schemes [ D ]. Stanford: Stanford University ,2005.
  • 10A Shamir. Identity-based cryptosystems and signature schemes[A].1984.47-53.

共引文献90

同被引文献112

  • 1Al-Riyami S,Paterson K.Certificateless public key cryptography[C]//Asiacrypt 2003.LNCS 2894,Berlin:Springer-Verlag,2003:452-473.
  • 2Gutmann P.PKI:It's not dead,just resting[J].IEEE Computer,2002,35(8):41-49.
  • 3Shamir A.Identity-based cryptosystems and signature schemes[C]// Crypto 1984.LNCS 196,Berlin:Springer-Verlag,1984:47-53.
  • 4Huang X,Mu Y,Susilo W.et al.Certificateless signatures:new schemes and security models[J].The Computer Journal,2012,55(4):457-474.
  • 5Boneh D,Gentry C,Lynn B.et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]//Proceedings of Cryptology-Eurocrypt 2003.Berlin:Springer,2003.416-432.
  • 6Xiong H,Guan Z,Chen Z.et al.An efficient certificateless aggregate signature with constant pairing computations[J].Information Science,2013,219:225-235.
  • 7He D,Tian M,Chen J.Insecurity of an efficient certificateless aggregate signature with constant pairing computations[J].Information Sciences,2014,268:458-462.
  • 8Itakura K,Nakamura K.A public- key cryptosystem suitable for digital multi signature[J].NEC Research and Development,1983,71(10):I-8.
  • 9Du H,Wen Q.Certificateless proxy multi-signature[J].Information Sciences,2014,276:21-30.
  • 10A1-Riyami S S, Paterson K G. Certificateless public key cryptosraphy [ C ]// Proc of ASIACRYPT 2003. 2003 : 452-473.

引证文献13

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部