期刊文献+

使用自认证公钥的盲签密方案 被引量:4

Blind signcryption scheme using self-certified public keys
下载PDF
导出
摘要 首次结合自认证公钥技术和盲签密思想,基于双线性对提出了一个新的使用自认证公钥的盲签密方案,并在随机预言机模型下给出了安全性证明。在ECDL和GBDH问题的困难性假设下,该方案被证明是安全的。新方案避免了基于身份密码系统中固有的密钥托管问题,不需要使用任何公钥证书。在计算复杂性方面,所提方案仅仅需要两次双线性对运算,效率非常高。 By merging the concepts of self-certified public key and blind signcryption for the first time, this paper proposed a new blind signcryption scheme from bilinear pairings using self-certified public keys and proved its security in the random oracle model. Proved the scheme to be secure under the hardness of elliptic curve discrete logarithm problem and gap bilinear Dif- fie-ltellman problem. The new scheme overcame the inherent key escrow problem of identity-based cryptography, no public key certificate was required. Moreover, the proposed was efficient since only two pairing operations were required.
出处 《计算机应用研究》 CSCD 北大核心 2009年第9期3508-3511,共4页 Application Research of Computers
基金 国家教育部科学技术研究重点资助项目(208148) 西北师范大学网络安全重点学科基金资助项目
关键词 自认证公钥 盲签密 可证明安全性 随机预言模型 双线性对 self-certified public key blind signcryption provable security random oracle model bilinear pairings
  • 相关文献

参考文献10

  • 1ZHENG Yu-liang. Digital signcryption or how to achieve cost ( signature & encryption) < < cost (signature) + cost (encryption) [ C ]// Advances in Cryptology-CRYPYO' 97. Berlin: Springer-Verlag, 1997 : 165-179.
  • 2CHAUM D. Blind signature for untraceable payments[ C ]//Advances in Cryptology-CRYPTO' 82. New York : Springer, 1983 : 199-203.
  • 3YUEN T H, WEI V K. Fast and proven secure blind identity-based signcryption from pairings [ C ]// Proc of Ct-RSA 2005. Berlin: Springer-Verlag, 2005:305-322.
  • 4GIRAULT M. Self-certified public keys [ C ]//Advances in Cryptology-EUROCRYPT' 91. Berlin : Springer-Verlag, 1991:491-497.
  • 5POINTCHEVAL D, STERN J. Provably secure blind signature schemes [ C ]//Advances in Cryptology-ASIACRYPT ' 96. Berlin: Springer, 1996:252-265.
  • 6ZHANG Fang-guo, KIM K. Efficient ID-based blind signature and proxy signature from bilinear pairings [ C ]//Advances in ACISP 2003. Berlin: Springer, 2003:312-323.
  • 7CHEN Xiao-feng, ZHANG Fang-guo, LIU Sheng-li. ID-based restrictive partially blind signatures and applications [ J ].. The Journal of Systems and Software, 2007,80 ( 2 ) : 164 - 171.
  • 8钟军,何大可.一种新型的群盲签名方案[J].计算机应用研究,2008,25(3):927-929. 被引量:4
  • 9BOLDYREVA B. Effcient threshold signature, multisignature, and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme[ C]//Proc of PKC' 03. London, UK: Springer-Verlag, 2003:31-46.
  • 10CARMENISCH J, PIVETEAU J, STADLER M. Blind signatures based on the discrete logarithm problem [ C ]//Advances in Cryptology-EUROCRYPT' 94. Berlin: Spfinger-Verlag, 1994:428-432.

二级参考文献14

  • 1CHAUM D, HEYST E V. Group signatures [ C ]//Proc of EURO-CRYPT'91. New York: Springer-Verlag, 1991:257-265.
  • 2ATENIESE G, CAMENISCH J, JOYE M, et al. A practical and provably secure coalition-resistant group signature scheme [ C ]//Advances in Cryptology- CRYPTO 2000, LNCS 1880. Heidelberg: Springer-Verlag, 2000 : 255- 270.
  • 3CHAUM D. Blind signatures for untraceable payments [ C ]//RIVEST R L, SHERMAN A, CHAUM D. Proc of CRYPTO'82. New York: [s. n. ], 1983:199-203.
  • 4CHAUM D, FIAT A, NAOR M. Untraceable electronic cash[ C ]// . GOLDWASSER S. Proc of CRYPTO'88, Lecture Notes in Computer Science 403. [ S. l. ] : Springer-Verlag, 1988:319-327.
  • 5POINTCHEVAL D, STERN J. Provably secure blind signature schemes [ C ]//RHEE M Y, KIM K. Proc of Advances in Cryptology- ASIACRYPT' 96, Lecture Notes in Computer Science 1163. [ S.l. ] : Springer-Verlag, 1996 : 252 - 265.
  • 6JUELS A, LUBY M, OSTROVSKY R. Security of blind digital signatures[ C ]//Proc of CRYPTO ' 97, Lecture Notes in Computer Science 1294. [ S. l. ] : Springer-Verlag, 1997 : 150-164.
  • 7BELLARE M, ROGAWAY P. Random oracles are practical: a paradigm for designing efficient protocols[ C]//Proc of the 1st ACM Conference on Computer and Communications Security. [ S. l. ] : Fairfax, 1993:62-73.
  • 8LYSYANSKAYA A, RAMZAN Z. Group blind digital signatures: a scalable solution to electronic cash [ C ]//Proc of Int' l Conf on Financial Cryptography. New York : Springer-Verlag, 1998 : 184- 197.
  • 9PARK S, KIM S, WON D. ID-based group signature[J]. Electronics Letters, 1997,33( 19 ) : 1616-1617.
  • 10CHEN X, ZHANG F, KIM K. A new ID-based group signature scheme from bilinear pairings [ EB/OL]. ( 2003- 11- 06 ). http:// eprint, iacr. org/2003/116.

共引文献3

同被引文献41

  • 1张亚玲,禹勇,王晓峰,王铁英.基于RSA签名的安全数字时间戳方案[J].计算机应用,2005,25(2):381-382. 被引量:4
  • 2朱国东,宁红宙,刘云.基于证书权威(CA)中心的时间戳服务系统的实现[J].中国安全科学学报,2004,14(12):87-90. 被引量:10
  • 3王凯戎.电子病历的法律地位及应用的可行性[J].中华医院管理杂志,2005,21(8):554-557. 被引量:44
  • 4施荣华,周玉.一种前向安全的动态子群签名方案[J].计算机工程与应用,2006,42(30):130-133. 被引量:3
  • 5S. S. AI--Riyami and K. G. Paterson. Certificateless public key cryptography[A]. In: Advances in Cryptology- ASIACRYPT 2003. Lecture Notes in Computer Seience: vol 2894[C]. Berlin: Springer-Verlag, 2003: 452-473.
  • 6C. Wu and Z. Chen. A new efficient certificateless signcryption scheme[A]. In: International Symposium on Information Science and Engieering: vol 1 [C]. USA:IEEE, 2008: 661-664.
  • 7S. S. D. Selvi, S. S. Vivek, and C. P. Ragan. On thesecurityof certificateless signcryption schemes[EB/OL]. Cryptology ePrint Archive:Report 2009/298, Availablefrom: http://Eprintiaer. org/2009/298.
  • 8B. Waters. Efficient identity--basedeneryption without random oracles[A]. In : Advances in Cryptology-EUROCRYPT 2005. Lecture Notes in Computer Science: vol 3494 [C]. Berlin: Springer- Verlag, 2005: 114--127.
  • 9Z. Liu, Y. Hu, X. Zhang, and H. Ma. Certifieateless signcryption scheme in the standard model [J]. Information Sciences, 2010, 180(3): 452-464.
  • 10Chaum D. Blind signature for untraceable payments[C]//Proceedingsof CRYPTO'82. Berlin: Plenum Press, 1993: 199-203.

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部