期刊文献+

基于双线性对的Chameleon签名方案(英文) 被引量:4

Chameleon Signature from Bilinear Pairing
下载PDF
导出
摘要 Chameleon签名方案是一种利用Hash-and-Sign模式的非交互签名方案,并且具有不可转移性,只有指定的接收者才可以确信签名的有效性.利用双线性对提出了一种新的Chameleon Hash函数,并在此基础上构建了相应的基于身份的Chameleon签名方案.与传统的Chameleon Hash函数相比,该方案中的Hash函数公钥所有者无须获取相应私钥,除非它企图伪造签名.该方案不但具有通常Chameleon签名方案的所有特点,而且具有基于身份密码系统的诸多优点. Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that they are non-transferable, with only the designated recipient capable of asserting its validity. This paper introduces a new chameleon hash function based on bilinear pairing and builds the ID-based chameleon signature scheme. Compared with the conventional chameleon hashing functions, the owner of a public hash key in the ID-based chameleon hashing scheme does not necessarily need to retrieve the associated secret key. The scheme enjoys all the attributes in the normal chameleon signature and the added characteristics of ID-based cryptography based on bilinear pairing.
出处 《软件学报》 EI CSCD 北大核心 2007年第10期2662-2668,共7页 Journal of Software
基金 Supported by the Communication Security Foundation of China under Grant Nos.J641, 0130 (国家通信保密基金) the National Natural Science Foundation of China under Grant No.69931010 (国家自然科学基金)
关键词 数字签名 双线性对 CHAMELEON HASHING Chameleon签名 digital signature bilinear pairing Chameleon hashing Chameleon signature
  • 相关文献

参考文献10

  • 1Chaum D, Antwerpen H. Undeniable signatures. In: Brassard G. Advances in Cryptology-CRYPTO'89. Springer-Verlag, 1991. 212-216.
  • 2Boyar J, Chaum D, Damgard IB, Pedersen TP. Convertible undeniable signatures. In. Menezes A, Vanstone SA, eds. Advances in Cryptology-CRYPTO'90. Springer-Verlag, 1990. 189-205.
  • 3Chaum D. Zero-Knowledge undeniable signature. In: Damgard I, ed. Advances in Cryptology-EURPCRYPT'90. Aarhus: Springer- Verlag, 1990. 458-464.
  • 4Chaum D, van Heijst E, Pfitzmann B. Cryptographically strong undeniable signatures, unconditionally secure for the signer. In: Feigenbaum J, ed. Advances in Cryptology-CRYPTO'91. Springer-Verlag, 1990. 470-484.
  • 5van Heijst E, Pedersen T. How to make efficient fail-stop-signatures. In: Rueppel RA, ed. Advances in Cryptology- EURPCRYPT'92. Balatonfured. Springer-Verlag, 1993. 366-377.
  • 6Krawczyk H, Rabin T. Chameleon signature. In: Proc. of the Network and Distributed System Security Symp. (NDSS 2000). The Internet Society, 2000. 143-154.
  • 7Boneh D, Franklin M. Identity-Based encryption from the Weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. Springer-Verlag, 2001.213-229.
  • 8Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In: Boyd C, ed. Advances in Cryptology-ASIACRYPT 2001. Gold Coast: Springer-Verlag, 2001.514-532.
  • 9Gentry C, Silverberg A. Hierarchical ID-based cryptography. In: Zheng YL, ed. Advances in Cryptology-ASIACRYPT 2002. Queenstown: Springer-Verlag, 2002. 213-229.
  • 10Horwitz J, Lynn B. Toward hierarchical identity-based encryption. In: Knudsen LR, ed. Advances in Cryptology-EURPCRYPT 2002. Amsterdam: Springer-Verlag, 2002. 466-481.

同被引文献25

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部