期刊文献+

一个基于双线性映射的前向安全门限签名方案 被引量:13

A Forward Secure Threshold Signature Scheme from Bilinear Pairing
下载PDF
导出
摘要 将前向安全的概念引入到基于双线性映射的门限签名方案中,提出了一个基于双线性映射的前向安全的门限签名方案.该方案将签名密钥分散到签名成员集合中,采用各成员部分密钥前向更新的方式实现了签名密钥的前向更新,增强了签名密钥的安全性,使得签名方案具有前向安全性.另外,由于部分密钥具有前向更新的特性,从而方案有效防止了移动攻击.对该方案的安全性进行了分析,分析表明,该方案是安全、有效的. A forward secure threshold signature scheme from bilinear pairing is proposed by combining the concept of forward security with threshold signature from bilinear pairing. In the scheme proposed the signature key is distributed into the whole group and is updated by means of updating partial keys. So the security of the signature key is enhanced and the scheme has the characters of forward security. Furthermore, for the character of partial keys-update, the scheme can prevent the mobile adversaries. The security of the scheme is also analyzed. It is shown that the proposed scheme is secure and effective.
出处 《计算机研究与发展》 EI CSCD 北大核心 2007年第4期574-580,共7页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60273027) 国家"九七三"重点基础研究发展规划基金项目(G1999035802) 国家杰出青年基金项目(60025205)
关键词 门限签名 双线性映射 前向安全 基于身份的密码体制 threshold signature bilinear pairing forward secure ID-based cryptography
  • 相关文献

参考文献11

  • 1D Boneh,M Franklin.Identity-based encryption from the Weil pairing[G].In:Advances in Cryptology-Crypto 2001,LNCS 2139.Berlin:Springer-Verlag,2001.213-229
  • 2D L Vo,F Zhang,K Kim.A new threshold blind signature scheme from pairings[C].In:SCIS2003.New York:ACM Press,2003.26-29
  • 3J Baek,Y Zheng.Identity-based threshold signature scheme from the bilinear pairings[C].In:IAS'04 Track of ITCC'04.Los Alamitos:IEEE Computer Society Press,2004.124-128
  • 4马春波,何大可.基于双线性映射的卡梅隆门限签名方案[J].计算机研究与发展,2005,42(8):1427-1430. 被引量:8
  • 5F Hess.Efficient identity based signature schemes based on pairings[G].In:Selected Areas in Cryptography(SAC 2002),Lecture Notes in Computer Science 2595.Berlin:Springer-Verlag,2002.310-324
  • 6R Ostrovsky,M Yung.How to withstand mobile virus attacks[C].The 10th Annual Symp on Principles of Distributed Computing (PODC'91),Montreal,Quebec,Canada,1991
  • 7A Shamir.Identity-based cryptosystems and signature schemes[G].In:Advances in Cryptology-Crypto' 84,LNCS 196.Berlin:Springer-Verlag,1984.47-53
  • 8R Canetti,S Halevi,J Katz.A forward-secure public-key encryption scheme[G].In:Advances in Cryptology-Eurocrypt '03,LNCS 2656.Berlin:Springer-Verlay,2003.255-271
  • 9F Hu,C-H Wu,J D Irwin.A new forward secure signature scheme using bilinear maps[R].Cryptology ePrint Archive,Tech Rep:2003/188,2003
  • 10Y Dodis,M Franklin,J Katz,et al.Intrusion resilient publickey encryption[G].In:Topics in Cryptology CT-RSA 2003,Lecture Notes in Computer Science 2612.Berlin:Springer-Verlag,2003.19-32

二级参考文献7

  • 1H. Krawezyk, T. Rabin. Chameleon signatures. In: Proc.NDSS2000. Dan Diego: IEEE Computer Society Press, 2000.143-154.
  • 2F. G. Zhang, R. SMavi-Naini, W. Susilo. ID-based Chameleon hashes from bilinear pairings, http://eprint.iacr.org/2003/208.2003-09-29/2004-04-28.
  • 3D. Boneh, B. Lynn, H. Shaeham. Short signatures from the Weil pairing. In: Advances in Cryptology-Asiacrypt' 2001,Lecture Notes in Computer Science 2248. Heidelberg: Springer,2002. 514-532.
  • 4X. F. Chen, F. G. Zhang, K. Kim. A new ID-based group signature scheme from bilinear pairings, http://eprint.iacr.org/2003/116, 2003-6-3/2003-08-06.
  • 5D. L. Vo, F. Zhang, K. Kim. A new threshold blind signature scheme from pairings. In: Proc of 2003 Symposium on Cryptography and Information Security(SCIS2003).Itaya,Japan: ACM Press, 2003. 233-238.
  • 6D. Boneh, B. Lynn, H. Shacham. Short signatures from the Weil pairing. In: Advances in Cryptology-Asiacrypt' 2001,Lecture Notes in Computer Science 2248. Heidelberg: Springer,2002. 514-532.
  • 7许春香,傅小彤,肖国镇.预防欺诈的矢量空间秘密共享方案[J].西安电子科技大学学报,2002,29(4):527-529. 被引量:13

共引文献7

同被引文献114

引证文献13

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部