期刊文献+

分层的基于身份的动态门限签名方案 被引量:2

Hierarchical ID-based proactive threshold signature scheme
下载PDF
导出
摘要 提出了一个分层的基于身份的动态门限签名方案.方案具有分层的PKG结构,低层PKG可以分担高层PKG的秘密信息产生和身份认证的任务;同时具有动态安全的特性,将签名的整个生命周期分成若干时间段,每个时间段都对密钥份额进行更新,更新后的份额重构的密钥保持不变.使用了离散对数相等的知识证明协议,以保证部分签名的正确性,并证明了方案的正确性、不可伪造性和鲁棒性.给出了方案的一些扩展. A hierarchical ID-based proactive threshold signature scheme is presented. The scheme has the structure of hierarchical PKGs, so a lower-level PKG can share the workload of secret information generation and identity authentication with a higherlevel PKG. At the same time the scheme has the property of proactive security, that is, the whole lifetime of signature is divided into several time periods, and the shares of private key need to be, renewed in each time period. However, new shares can construct the same private key as old shares. We assure the correctness of part signatures by the knowledge proof protocol of discrete logarithm equality, and then prove that our scheme is correct, non-forgeable and robust. Finally, we give some extensions of this scheme.
作者 于佳 李大兴
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2006年第1期125-129,共5页 Journal of Shandong University(Natural Science)
基金 国家"863"高科技研究发展计划资助项目(2001AA141120)
关键词 动态安全 门限方案 双线性配对 分层的基于身份签名 proactive security threshold scheme bilinear parings hierarchical ID-based signature
  • 引文网络
  • 相关文献

参考文献16

  • 1A Shamir. Identity-based cryptosystems and signature schemes[A]. B Blakely. Proc. of Crypto'84,LNCS 196[C]. Berlin:Springer-Verlag, 1984. 47 - 53.
  • 2Y Desmedt, J Quisquater, Public-key systems based on the difficulty of tampering[A]. A M Odlyzko. Proc. of Crypto '86,LNCS263[C]. Berlin: Springer-Verlag, 1987. 111- 117.
  • 3H Tanaka. A realization scheme for the identity-based crypto-system[A]. C Pomerance. Prec. of Crypto '87, LNCS 293[C]. Berlin: Springer-Verlag, 1987. 341 - 349.
  • 4U Maurer, Y Yacobi. Non-interactive public-key cryptography[A]. D W Davies. Proc. of Eurocrypto '91, LNCS 547[C].Berlin: Springer-Verlag, 1992. 498 - 507.
  • 5D Boneh, M Franklin. Identity based encryption from the Weil pairing[A]. J Kilian. Advances in Cryptology-Crypto 2001,LNCS 2139[ C]. Berlin: Springer-Verlag, 2001. 213 - 229.
  • 6C Cocks. An identity based encryption scheme based on quadratic residues[A]. B Honary. Advances in Cryptography and Coding, LNCS 2260 [C]. Berlin: Springer-Verlag, 2001.360 - 363.
  • 7D Boneh, B Lynn, H Shacham. Short signatures from the Weil pairing[A]. C Boyd. Advances in Cryptology-Asiacrypt 2001,LNCS 2248[C], Berlin: Springer-Verlag, 2001. 514- 532.
  • 8F Zhang, K Kim. ID-based blind signature and ring signature from pairings[A]. Y Zheng. Advances in Cryptology Proceedings of Asiacrypt 2002, LNCS 2501 [C]. Berlin: Springcr-Verlag, 2002. 533 - 547.
  • 9X Boyen. Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography[A]. D Boneh. Advances in Cryptology- Crypto 2003, LNCS 2729[C]. Berlin:Springer-Verlag, 2003. 382- 398.
  • 10J Cha, J Cheon. An identity-based signature from Diffie-Hellman groups[A]. Y Desmedt. Public Key Cyptography Proceedings of PKC 2003, LNCS 2567 [C]. Berlin: Springer-Verlag, 2003. 18 - 30.

同被引文献1

引证文献2

二级引证文献1

;
使用帮助 返回顶部