期刊文献+

无证书消息可恢复签名 被引量:2

Certificateless Message Recovery Signature
下载PDF
导出
摘要 针对具有特定性质无证书数字签名的构造问题,研究无证书消息可恢复签名的构造方法。通过分析无证书数字签名的特点以及消息可恢复签名的性质,在无证书公钥系统中实现第1个无证书消息可恢复签名方案,把基于离散对数的知识签名作为工具,在随机预言机模型下证明该签名方案的安全性是基于DL困难性假设的。 Aiming at the construction problems of the certificateless signature with special properties,the construction methods of certificateless message recovery signature is researched.By analyzing the properties of the cetificateless signature and the message recovery signature,the first certificateless message recovery signature scheme in the certificateless cryptosystem is implemented.With the knowledge signature of discrete logarithm,it is proved this scheme is secure under the DL assumption in the random oracle model.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第20期163-164,共2页 Computer Engineering
基金 福建省自然科学基金资助项目(2008F5049 2007F3086) 福建省教育厅B类基金资助项目(JB07152)
关键词 无证书 消息可恢复 数字签名 安全性 cerificateless message recovery digital signature security
  • 相关文献

参考文献6

  • 1Paterson K. Certificateless Public Key Cryptography[C]//Proc. of the IEEE Int'l Conf. on Computer Science. Berlin, Germany: [s. n.], 2003.
  • 2Bessie C. Key Replacement Attack Against a Generic Construction of Cenificateless Signature[C]//Proc. of the 1 lth Australasian Conf. on Information Security and Privacy. Berlin, Germany: [s. n.], 2006.
  • 3王化群,徐名海,郭显久.几种无证书数字签名方案的安全性分析及改进[J].通信学报,2008,29(5):88-92. 被引量:17
  • 4Nyberg K. A New Signature Scheme Based on the DSA Giving Message Recovery[C]//Proc. of the 1st ACM Conference on Computer and Communication Security. [S. l.]: ACM Press, 1993.
  • 5Nyberg K. Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem[Z]. (2006-06-08). http://www.springerlink.com/content/p 1545365x147q313/.
  • 6Camenisch J. Efficient and Generalized Group Signatures[Z]. (1997-01-01). http://www.springerlink.com/content/tgxdgqx7d01303b1/.

二级参考文献12

  • 1BESSIE C H, ZHANG Z F, DENG X T. Certificateless signature: a new security model and an improved generic construction[J]. Designs, Codes and Cryptography, 2007, 42(2): 109-12.6.
  • 2SATTAM S A, KENNETH G P. Certificateless public key cryptography[A]. Proc Asiacrypt'03[C]. Springer-Verlag, 2003.452-473.
  • 3ZHANG Z F, FENG D G. On the security of a certificateless public-key encryption [EB/OL]. http://eprint.iacr.org/2005/426.
  • 4CHOW S S M, YAP W S. Certificateless ring signatures [EB/OL]. http://eprint.iacr.org/2007/236.
  • 5ZHANG L, ZHANG F T, WU W. A provably secure ring signature scheme in certificateless Cryptography[A]. provsec'07[C]. Springer- verlag, 2007. 103-121.
  • 6GORANTLA M C, SAXENA A. An efficient certificateless signature scheme[A]. CIS'05[C]. Springer-Verlag, 2005. 110-116.
  • 7CAO X F, KENNETH G. P, KOU W D. An attack on a certificateless signature scheme, cryptology ePrint archive[EB/OL], http://eprint. iacr.org/2006/367.
  • 8YAP W S, HENG S H, GOI B M. An efficient certificateless signature scheme[A]. EUC 2006[C]. Springer-Verlag, 2006. 322-331.
  • 9PARK J H. An attack on the certificateless signature scheme from EUC workshops 2006 [EB/OL]. http://eprint.iacr.org/2006/442.
  • 10LIU J K, AU M H, SUSILO W. Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model[A]. ASIACCS'07[C]. ACM New York, 2007. 273-283.

共引文献16

同被引文献20

  • 1吴问娣,曾吉文.一种无证书的环签名方案和一个基于身份的多重签名方案[J].数学研究,2006,39(2):155-163. 被引量:15
  • 2C. Gentry. Certificate-Based Encryption and the Certificate Revocation Problem[C]. Advances in Cryptology - EUROCRYPT 2003, LNCS 2656. Berlin: Springer-Verlag, 2003, 272-293.
  • 3B. Kang, J. Park, S. Hahn. A Certificate-Based Signature Scheme[C]. Topics in Cryptology - CT-RSA 2004, LNCS 2964. Berlin: Springer-Verlag, 2004, 99-111.
  • 4K. Liu, J. Baek, W. Susilo, et al. Certificate-Based Signature Schemes without Pairings or Random Oracles[C]. Information Security Conference 2008, LNCS 5222. Berlin: Springer-Verlag, 2008, 285-297.
  • 5J. Zhang. On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings[C]. Information Security Practice and Experience 2009, LNCS 5451. Berlin: Springer-Verlag, 2009, 47-58.
  • 6J. Li, X. Huang, Y. Mu, et al. Certificate-Based Signature: Security Model and Efficient Construction[C]. Public Key Infrastructure 2007, LNCS 4582. Berlin: Springer-Verlag, 2007, 110-125.
  • 7Y. Ming, Y. Wang. Efficient Certificate-Based Signature Scheme[C]. Proceedings of the 2009 Fifth International Conference on Information Assurance and Security. Washington: IEEE Computer Society, 2009, 87-90.
  • 8K. Nyberg, R.A. Rueppel. A New Signature Scheme Based on the DSA Giving Message Recovery[C]. Proceedings of the I st ACM conference on Computer and communications security. New York: ACM, 1993, 58-61.
  • 9F. Zhang, W. Susilo, Y. Mu. Identity-based Partial Message Recovery Signatures (or How to Shorten ID-based Signatures) [C]. Proceedings of the 9th International Conference on Financial Cryptography and Data Security (FC 2005), LNCS 3570. Berlin: Springer-Verlag, 2005, 45-56.
  • 10R. Tso, C. Gu, T. Okamoto, et al. Efficient ID-Based Digital Signatures with Message Recovery[C]. Cryptology and Network Security 2007(CANS 2007), LNCS 4857. Berlin: Springer-Verlag, 2007, 47-59.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部