期刊文献+

基于椭圆曲线密码体制的具有前向安全特性的签名方案 被引量:1

Signature Schemes with Forward Security Based on Elliptic Curve Cryptosystem
下载PDF
导出
摘要 根据有限域上非超奇异椭圆曲线离散对数难解性假设,利用椭圆曲线上Weil配对的双线性性质设计了一种新的基于椭圆曲线密码体制的前向安全数字签名方案,并将前向安全特性和盲签名基本思想融为一体,在此方案的基础上又设计了一种前向安全强盲签名方案.与以往盲签名方案相比,这种前向安全强盲签名方案增加了前向安全特性,对盲签名的有效时间进行了控制,在保证签名前向安全的基础上进一步保护了消息发送方的隐私权,可应用于更加广泛的领域.本文还提出了时段因子的新概念,两种新方案均通过时段因子辅助私钥进化并将其作为签名的重要组成部分且参与验证过程,因此两种方案同时具备有效性、前向安全性和抗伪造性等性质,有效地确保了签名算法的安全性. Based on the difficulty assumption in solving the non-supersingular elliptic curve discrete logarithm problem over finite field, this paper designs a new forward-secure signature scheme based on elliptic curve cryptosystem by using the bilinear property of Weil pairing defined on elliptic curves, and furthermore proposes a forward-secure strong blind signature scheme based on the proposed scheme by combining the fundamental ideas of forward security and blind signature. The proposed forward-secure strong blind signature scheme increases the forward security and limits the effective time of the blind signature compared with the previous blind signatures, by which the senders' privacy is further protected on the basis of ensuring forward-security, such that the proposed scheme has more extensive applications. By the introduction of a new conception named interval-factor assisting the secret key in evolving in this paper, the two proposed schemes have the features of correctness, forward-security and forging attack resistance, which ensures the safety throughout the lifetime of the schemes effectively. The interval-factor, as an important component of the signature, participates in the verification phase.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2008年第5期547-551,共5页 Journal of Wuhan University:Natural Science Edition
基金 国家高技术研究发展计划(863)项目(2007AA01244) 国家自然科学基金(60473012) 江苏省“六大人才高峰”项目(06-E-025) 徐州师范大学自然科学基金资助项目(07XLB15)
关键词 椭圆曲线密码体制 双线性对 前向安全 盲签名 椭圆曲线离散对数 elliptic curve cryptosystem bilinear pairings forward security blind signature elliptic curve discrete logarithm
  • 相关文献

参考文献9

  • 1Elisavet K, Yannis C S,Christos Z. Efficient Generation of Secure Elliptic Curves [J].International Journal of Information Security ,2007,6(1):47-63.
  • 2Selcuk B, Sandeep K, Christof P, et al. State-of-theArt Elliptic Curve Cryptographie Processor Operating in the Frequency Domain [J].Mobile Networks and Applications, 2007,12(4) : 259-270.
  • 3Anderson R. Two Remarks on Public Key Cryptology[C]//The Fourth Annual Conference on Computer and Communications Security. New York: ACM Press, 1997 : 148-160.
  • 4Krawczyk H. Simple Forward-Secure Signatures from Any Signature Scheme ~C]//Proceedings of the 7th ACM Conference on Computer and Communications Security. New York : ACM Press, 2000 : 108-115.
  • 5Ran C, Shai H, Jonathan K. A Forward-Secure Public-Key Encryption Scheme [J]. Journal of Cryptology, 2007,20(3) : 265-294.
  • 6Chaum D. Blind Signatures for Untraceable Payments [C]//Advances in CryDtology-CRYPTO ' 82. New York: Springer-Verlag, 1983 : 199-203.
  • 7Harn L. Cryptanalysis of the Blind Signature Based on the Discrete Logarithm Problem [J]. Electronic Letters, 1995,31 (14) : 1136-1137.
  • 8Abe M, Fuiisaki E. How to Date Blind Signature [C]//Proc of Advances in Cryptology-ASIACRYPT (LNCS 1163). New York: Springe-Verlag, 1996 : 244- 251.
  • 9Boneh D, Lynn B,Shacham H. Short Signatures from the Weil Pairing [C]//Advance in Cryptology-ASIACR YP T ' 2 O01 ( LNCS 2248). Berlin : Springer-Verlag, 2001 :514-532.

同被引文献11

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部