期刊文献+

高效的使用双线性对的自认证公钥签名 被引量:6

An efficient self-certified public key signature from bilinear pairings
下载PDF
导出
摘要 在自认证公钥签名中,验证签名有效性的同时,也验证了公钥的真实性。与已有的基于证书和基于身份的两种签名相比,自认证公钥体制具有通信代价低、计算量少的优点。现有的使用双线性对的自认证公钥签名的文献数量少,效率也有待进一步提高。为此使用双线性对,构造了一种高效的自认证公钥签名方案。分析表明,新方案不仅安全,而且其效率也优于已有文献。 In self-certified public key signature scheme,the tasks of verifying the authenticity of public key and validating the signature were carried out simultaneously.The self-certified public key signature is more efficient than the existing certificate-based signature and identity-based signature in terms of communication overheads and computation efforts.There are only a few self-certified public key signatures of which the efficiency needs to be improved.In this paper,an efficient self-certified public key si...
作者 张学军
出处 《计算机应用》 CSCD 北大核心 2009年第2期355-356,共2页 journal of Computer Applications
基金 国家自然科学基金资助项目(60573043)
关键词 自认证公钥 签名 双线性对 self-certified public key signature bilinear pairings
  • 相关文献

参考文献1

二级参考文献9

  • 1XUE Q S, CAO Z F. A threshold proxy signature scheme using self-certified public keys [C]// Proceedings of Eurocrypt '96, LNCS 3358. Berlin: Springer-Verlag, 2004:715-724.
  • 2HSU C L, WU T S. Efficient proxy signature schemes using self-certified public keys [J]. Applied Mathematics and Computation, 2004, 152(3) : 807 -820.
  • 3ZHANG J H, ZOU W, CHEN D, et al. On the security of a digital signature with message recovery using self-certified public key [J]. Informatica (Slovenia), 2005, 29(3): 243-346.
  • 4WANG G L. Designated-verifier proxy signatures for e-commerce [EB/OL]. [2007-4 - 10]. http://icsd. izr. a-star. edu. sg/staff/guilin/papers/ICME04-fl. pdf.
  • 5WANG G L. Designated-verifier proxy signature schemes [C]//Security and Privacy in the Age of Ubiquitous Computing, Proceedings of 20th International Conference on Information Security ( IFIP/SEC 2005). Berlin: Springer-Verlag, 2005:409-423.
  • 6LAL S, VERMA V. Identity based strong designated verifier proxy signature schemes [EB/OL]. [2007 -4 - 10]. http://eprint. iaer. org/2006/394, pdf.
  • 7CAO T, LIN D, XUE R. ID-based designated-verifier proxy signatures [J]. IEE Proceedings- Communications, 2005, 152(6) : 989 -994.
  • 8SAEEDNIA S, KREME S, MARKOTWICH O. An efficient strong designated verifier signature scheme [C]// ICICS 2003, LNCS 2971. Berlin: Springer-Verlag, 2003:40-54.
  • 9GIRAULT M. Self-certified public keys [C]// Proceedings of Eurocrypt'91, LNCS 434. Berlin: Springer-Verlag, 1991:491-497.

同被引文献46

  • 1杨长海,唐西林.基于身份的门限多代理多签名方案[J].计算机应用研究,2009,26(2):702-704. 被引量:2
  • 2张春生,姚绍文,张险峰.基于状态树的(t,n)门限密钥托管方案[J].计算机工程与应用,2007,43(4):146-149. 被引量:3
  • 3王勇兵,张建中.门限多代理多签名方案[J].计算机应用研究,2007,24(6):131-132. 被引量:7
  • 4DIFFIE W, HELLMAN M. New direction in cryptography[ J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.
  • 5ADAMA C, LLOYD S. Understanding public-key infrastructure: Concepts, standards, and deployment considerations[ M]. Miami, Florida : Macmillan Technical Publishing, 1999.
  • 6SHAMIR A. Identity-base cryptosystems and signature schemes[ C]// Proceedings of CRYPTO 84 on Advances in Cryptology. New York: Springer-Verlag, 1984, 196:47 -53.
  • 7GUTMANN P. PKI: It's not dead, just resting[J]. IEEE Computer, 2002, 35(8): 41-49.
  • 8GIRAULT M. Self-certified public keys[ C]//Advances in Cryptology proceeding of Eurocrypt 1991, LNCS 547. Berlin: Springer-Verlag, 1999:490-497.
  • 9LEE B, KIM K. Self-certified signatures[ C]//Advances in Cryptology Proceeding of Indocrypt 2002, LNCS 2551. Berlin: SpringerVerlag, 2002:200 - 214.
  • 10SHAO Z. Improvement of distal signature with message recovery using self-certified public keys and its variants[ J]. Applied Mathematics and Computation, 2004( 159): 391 -399.

引证文献6

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部