期刊文献+

一种新的基于属性的广播签名算法

A Novel Attribute-Based Broadcast Signature Algorithm
下载PDF
导出
摘要 针对现有基于ABE广播签名算法的复杂性,提出了一个新的基于属性的广播签名算法。现有的基于ABE的广播网签名算法,每次通信需要传输签名认证所需的线性秘密共享矩阵M,在通信量和用户存储能力上要求很高。该文的基于属性的签名算法是在CP-ABE的基础上发展来的,但此算法使用了新的接入策略,即使用求最大公约数(GCD)的方法取消了对线性秘密共享矩阵M的需求,接收者只需计算3个双线性对即可完成签名认证。此算法降低了通信量和接收者运算复杂度,对某些能量受限的网络,如Ad Hoc网络,有很好的适应性。 For the complexity of the existing broadcast signature algorithms based on the ABE,propose a new signature algorithm based on the attributes. In the existing ABE broadcast signature scheme, senders need to transmit the linear secret sharing matrix M, which causes the heavy traffic and requires lots of storage space of receivers. Scheme based on the CP - ABE has different access policy, which computes the greatest common divisor of polynomial(GCD) instand of the linear secret sharing matrix M. In return, a receiver performs only 3 pairing computations. The traffic and the receivers' computing complexity are reduced in this scheme. This algorithm is also adapted to the resouree- restricted networks, such as Ad Hoe networks.
出处 《计算机技术与发展》 2010年第2期40-43,共4页 Computer Technology and Development
基金 国家自然科学基金项目(60873231) 江苏省高校自然科学基金项目(08KJB520006) 江苏省"六大人才高峰"基金项目(06-E-044)
关键词 ABE 最大公约数 广播 签名 ABE the greatest common divisor broadcast signature
  • 相关文献

参考文献8

  • 1姚前,陈舜,谢立.带系数的离散对数知识签名[J].电子学报,2007,35(4):659-662. 被引量:1
  • 2蔡永泉,张雪迪,姜楠.一种新的基于身份的门限签名方案[J].电子学报,2009,37(B04):102-105. 被引量:12
  • 3肖红光,谭作文,王键.一种前向安全的代理盲签名方案[J].通信技术,2009,42(5):193-196. 被引量:10
  • 4Boneh D, Franklin M. Identity - based eneryption from the Weil pairing[C]//Advanees in Cryptology, CRYPTO 2001, Lecture Notes in Computer Science. [ s. l. ] : [ s. n. ] ,2001:213 - 229.
  • 5Bethenconrt J, Sahai A, Waters B. Ciphertext - Policy Attribute- Based Eneryption[ C]//In IEEE Symposium on Security and Privacy. Oakland, California: [ s. n. ] ,2007: 321 - 334.
  • 6Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryptiort with short ciphertexts and private keys[C]//In Proc. of Advances in Cryptology- Crypto' 05. California: [ s. n. ] ,2005:258 - 275.
  • 7Lubicz D,Sirvent T. Attribute- Based Broadcast Encryption Scheme Made Efficient[ C]//Proe. of Progress in Cryptology - Africacrypt ' 08. Casablanca (Morocco) : [ s. n. ], 2008: 325 - 342.
  • 8Khader D. Attribute Based Group Signatures[R] ePrint Archive:Report. [ s.l. ] : [ s. n. ] ,2007.

二级参考文献31

  • 1刘颖,胡予濮,王飞,卢晓君.一个高效的基于身份的门限签名方案[J].西安电子科技大学学报,2006,33(2):311-315. 被引量:13
  • 2Chaum D. Blind signature for untraceable payments[C]. New York: Springer-Verlag, 1983:199-203.
  • 3Chaum D, Fiat A, Naor M. Untraceable electronic cash[C]// Goldwasser S (Ed.). Advances in Cryptology CRYPTO '88, LNCS 403, Berlin Heidelberg:Springer-Yerlag, 1990:319-327.
  • 4Brands S. Untraceable off-line cash in wallets with observers[C]// Proceedings of the Crypto' 93. LNCS 773, New York: Springer-Yerlag, 1994:302-318.
  • 5Chaum D, Boen B, Heyst E, et al. Efficient off-line electronic check[C]//Quisquater J, Vandewalle J(Ed.) Proceedings of the Eurocrypt' 89. LNCS 434, New York: Springer-Verlag, 1990:294-301.
  • 6Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation[C]//Proc, of the 3rd ACM Conf. on Computer and Communication Security. New Delhi, India: ACM Press, 1996:48-57.
  • 7Lin W D, Jan J K. A Security Personal Learning Tools Using a Proxy Blind Signature Scheme [C]// Proceedings of International Conference on Chinese Language Computing, Illinois, USA:[s.n.], 2000: 273-277.
  • 8Tan Z W, Liu Z J, Tang C M. Digital proxy blind signature schemes based on DLP and ECDLP[C]// Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002: 212-217.
  • 9Awasthi L S. A Proxy Blind Signature Scheme "Revised Version" [J]. Transaction on Cryptology, 2005, 2(01) : 5-11.
  • 10Cunther C. An identity-based key-exchange protocol[C]. [s. l.]: Lecture Notes in Computer Science, 1989: 29-37.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部