期刊文献+

基于身份无可信中心的数字签名方案 被引量:2

Signature scheme without trusted party based on identity
下载PDF
导出
摘要 针对目前基于身份无可信中心数字签名方案效率较低的问题,提出了一个新的基于身份无可信中心的数字签名方案,并在随机预言模型下证明该方案能抵抗适应性选择消息和身份的存在性伪造攻击。该方案与其它基于身份无可信中心签名方案相比,具有更高的效率。 A new ID-based signature scheme without a trusted party is introduced against the problem of the low efficiency of identity- based signature scheme without a trusted party. This scheme is proved secure against existential forgery on adaptively chosen message and ID attack under random oracle model. The efficiency of this scheme is higher than the other identity-based signature scheme without a trusted party.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第23期5607-5609,共3页 Computer Engineering and Design
基金 国家自然科学基金项目(60373026)
关键词 基于身份 无可信中心 签名 双线性对 随机预言模型 identity-based non-trusted party signature bilinear pairings random oracle model
  • 相关文献

参考文献8

  • 1Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing[C]. Gold Coast, Queensland, Australia: Proc Advances in Cryptology-Asiacrypt, 2001,514-532.
  • 2Paterson K G.ID-based signature from pairing on elliptic curves [OL]. Cryptology ePrint Archive, 2002.http://eprint.iacr.org/ 2002/004.
  • 3Hess F. Efficient identity based signature schemes based on pairings[C]. Selected Area in Cryptography, SAC'02. Heidelberg: Springer-Verlag, 2003,310-324.
  • 4Cha J C, Cheon J H.An identity-based signature from gap Diflie- Hellman groups [C]. Public Key Cryptography-PKC. Berlin: Springer-Verlag, 2003,18-30.
  • 5Barreto P, Libert B, McCullagh N, et al. Efficient and provably-secure identity-based signature and signcryption from bilinear maps[C]. Asiacrypt, LNCS 3788. Berlin:Springer-Verlag, 2005,515-532.
  • 6Chen X, Zhang F, Kim K. A new ID-based group signature scheme from bilinear pairings[OL], http://eprint.iacr.org/2003/116. pdf.
  • 7苏达峰,谢冬青.一类基于身份的无需可信中心的签名方案[J].计算机工程与应用,2006,42(1):115-116. 被引量:5
  • 8Boneh D, Boyen X. Efficient selective ID secure identity based encryption without random Oracles [C]. Advances in Cryptology-Eurocrypt. Berlin: Springer-Verlag, 2004, 223-238.

二级参考文献5

  • 1A Shamir.An identity based cryptosystems and signature schemes[C]. In:Advances in Cryptology-SRYPTO'84,volume 196 of LNCS,Spfinger-Verlag, 1984 : 47-53.
  • 2D Boneh,B Lynn,H ShachamShort signatures form the Weil pairing[C]. In:Advances in Cryptology-ASIACRYPT 2001,volume 2567 of LNCS, Springer-Verlag, 2001 : 514-512.
  • 3J C Cha,J H Cheon.An identity-based signature from gap Diffie-Hellman groups[C].In:Public Key Cryptography-PKC 2003,volume 2567 of LNCS,Springer-Verlag,2003:18-30.
  • 4Xiaofeng Chen,Fangguo Zhang,Kwangjo Kim.A New ID-based Group Signature Scheme from Bilinear Pairings.http://eprint.iacr.org/2003/ 116.pdf.
  • 5M Barreto,Y Kim,B Lynn.Efficient Algorithms for Pairing-Based Cryptosystems[C].in:Selected Areas in Cryptography-SAC'2003,volume 3006 of LNCS,Springer-Verlag,2003 : 17-25.

共引文献4

同被引文献15

  • 1韦永壮,周胜源,胡予濮.基于ID的新签密方案的安全性分析[J].信息安全与通信保密,2005,27(7):138-139. 被引量:2
  • 2苏达峰,谢冬青.一类基于身份的无需可信中心的签名方案[J].计算机工程与应用,2006,42(1):115-116. 被引量:5
  • 3徐吉斌,叶震.一种可公开验证的基于身份的签密方案[J].计算机应用,2007,27(6):1553-1555. 被引量:4
  • 4Shamir A. Identity-based cryptosystems and signature schemes [C]//Advances in Cryptology-Crypto' 84, LNCS 196, New York: Springer-Verlag, 1984:47-53.
  • 5Boneh D, Franklin M. Identity-based encryption from the weil pairing [ C ]//Proc. Crypto LNCS, 2001, 2139: 213-229.
  • 6Zheng Y. Digital signcryption or how to achieve cost ( signature&encryption ) ( cost ( signature ) + cost (en2cryption)) [ C ]//Advances in Cryptology-CRYPTO' 97, LNCS 1294,1997 : 165-179.
  • 7Zheng Y. Signcryption and its applications in efficient public key solution[ C]//ISW' 97, LNCS 1397, Springer-Verlag, 1998:291-312.
  • 8Hess F. Efficient identity based signature schemes based on Pairings [ C ]//Proceedings of the 9th Workshop on Selective Areas on Cryptography( SAC2002), Lecture Notes in Computer Science, Springer, Berlin,2002,2595.
  • 9Malone-Lee J. Identity-based signcryption[ EB/OL]. http ://eprint. iacr. org/2002/098,2008-09-24.
  • 10Shin J B, Lee K, Shim K. New DSA-verifialble signcryption schemes[ C]//Conferenees of the 5th International Conferenee on Information Security and Cryptology, ISCS' 02, LNCS 2587, 2002:35-47.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部