期刊文献+

面向协同设计的高效自证明多重签名方案 被引量:1

New self-certified multisignature scheme for collaborative design
下载PDF
导出
摘要 为解决协同设计环境中现有多重签名方案存在的工作效率较低和资源占有率偏高等问题,提出并实现了一种基于椭圆曲线密码体制的高效多重签名方案。通过引入公钥自证明思想和预计算步骤,将用户身份认证和数字签名验证有机结合在一起,无需繁琐的身份鉴别认证操作,也无需可信数字认证中心,只需要一次操作即可直接完成数字签名的验证工作。分析及实验表明,该方案结构简单,能有效抵抗目前已知的各种攻击,具有较高的工作效率、较低的资源占有率和较强的安全性。 A new multisignature scheme based on the elliptic curve cryptosystem was developed to solve the lower efficiency and higher resource occupation problems of the existing digitial signature schemes in the digital design environment. The proposed scheme combined the user identity authentication with signature verification through importing the idea of public key self-certified system and precomputation, It could finish the signature verification work in one step without the identity authentication operations, and also without the trusted certification authority server. The analysis and experiment indicated that the proposed scheme could resist the known attacks. It had simple structure, higher efficiency, lower resource occupation and stronger security.
出处 《计算机集成制造系统》 EI CSCD 北大核心 2009年第8期1639-1644,共6页 Computer Integrated Manufacturing Systems
基金 国家自然科学基金国际合作与交流资助项目(50620130441) 国家自然科学基金资助项目(50675166) 武汉市青年科技晨光计划资助项目(20055003059-5)~~
关键词 多重签名 椭圆曲线密码体制 公钥自证明 协同设计 multi-signature elliptic curve cryptosystem public key self-certified collaborative design
  • 相关文献

参考文献11

  • 1YANG Muxiang,HONG Fan,LI Jun.Secure threshold order-specified multi-signature scheme in MANET[C]//Proceedings of 2006 International Conference on Computational Intelligence and Security.Washington,D.C.,USA:IEEE Xplorer,2006:1279-1282.
  • 2ABOUD S J.An efficient digital multisignature scheme[C]// Proceedings of the 2nd Information and Communication Technologies.Piscataway,N.J.,USA:IEEE Press,2006:3298-3303.
  • 3YOON E J,YOO K Y.Cryptanalysis of two multisignature schemes with distinguished signing authorities[C]//Proceedings of International Conference on Hybrid Information Technology.Washington,D.C.,USA:IEEE,2006:492-495.
  • 4CAO Feng,CAO Zhenfu.Cryptanalysis on a proxy multi-signature scheme[C]//Proceedings of the 1st International MultiSymposiums on Computer and Computational Sciences.Washington,D.C.,USA:IEEE,2006:117-120.
  • 5XU Chunxiang,ZHOU Junhui,XIAO Guozhen.A multisignature scheme for the general access structure[C]//Proceedings of 2005 International Conference on Communications,Circuits and Systems.Washington,D.C.,USA:IEEE,2005:88-90.
  • 6CHAKRABARTI S,CHANDRASEKHAR S,SINGHAL M,et al.Authenticating feedback in multicast applications using a novel multisignature scheme based on cubic LFSR sequences[C]//Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops.Washington,D.C.,USA:IEEE,2007:607-613.
  • 7VAN DER MERWE J.DAWOUD D S,MCDONALD S.A fully distributed proactively secure threshold-multisignature scheme[J].IEEE Transactions on Parallel and Distributed Systems,2007,18(4):562-575.
  • 8LI Guowen,YU Jia,LI Rupeng,et al.Two threshold multisignature Schemes from Bilinear Pairings[C]//Proceedings of 2007 International Conference on Multimedia and Ubiquitous Engineering.Washington,D.C.,USA:IEEE,2007:1041-1045.
  • 9LEE B,KIM K.Self-certified signature[J].Lecture Notes in Computer Science,2002,2551:199-214.
  • 10李洪伟,孙世新,杨浩淼.网格化制造模式中基于身份的认证协议研究[J].计算机集成制造系统,2008,14(1):177-182. 被引量:5

二级参考文献14

  • 1刘敏,严隽薇,王坚.网格化制造模式中面向联盟协同的安全体系及技术[J].计算机集成制造系统,2006,12(3):458-464. 被引量:12
  • 2GLOBUS. Overview of the grid security infrastructure[DB/OL]. [2002-10-17]. http://www.globus.org/ security/overview. html.
  • 3THOMPSON M R, OLSON D, COWL ES R, et al. CA based trust issues for grid authentication and identity delegation [EB/OL]. [2005-10-05]. http://www.gridforum.org/ documents/ GFD/ GFD2I. 17. pdf.
  • 4FOSTER I, KESSELMAN C, TSUDIK G, et al. A security architecture for computational grids[C]//Proceedings of ACM Conference on Computers and Communications Security. New York,N.Y. ,USA:ACM Press, 1998:83-92.
  • 5WELCH V, SIEBENLIST F, FOSTER I, et al. Security for grid services[C]// Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing(HPDC'03). Piscataway, N. J. , USA.. IEEE Press, 2003:48-57.
  • 6MAO W B. An identity-based non interactive authentication framework for computational grids[EB/OL]. [2004-03-29]. http://www.hpl. hp. eom/techreports/2004/HPL-2004-96.pdf.
  • 7SHAMIR A. Identity-based cryptosystems and signature schemes [C]//Proceedings of Crypto'84, LNCS 196. Berlin, Germany: Springer-Verlag, 1985:47-53.
  • 8BONEH D, FRANKLIN M. Identity based eneryption from the Weil pairing [C]//Proeeedings of Crypto 2001, LNCS 2139. Berlin,Germany: Springer-Verlag, 2001:213-229.
  • 9GENTRY C, SILVERBERG A. Hierarchical ID-based cryptography [C]//Proceedings of ASIACRYPT 2002, LNCS 2501. Berlin,Germany: Springer-Verlag, 2002:548-566.
  • 10LIM H W, ROBSHAW M,. On identity-based cryptography and grid computing[C]//Proceedings of ICCS 2004, LNCS 3036. Berlin,Germany: Springer-Verlag,2004:474-477.

共引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部