期刊文献+

两个指定验证者签名方案的分析与改进 被引量:1

Aanalysis and improvement of two designated verifier signature schemes
下载PDF
导出
摘要 分析了两个基于身份的指定验证者签名方案(Zhang方案和Li-Zheng-Zhu方案),指出了两个签名方案不满足指定验证者签名的安全特性:Zhang方案不满足不可伪造性,Li-Zheng-Zhu方案中非指定验证者可以验证签名的有效性,不满足指定验证性。对两个方案进行了改进,改进后的Zhang方案满足不可伪造性,并具有与原方案相同的效率;改进后的Li-Zheng-Zhu方案不仅满足指定验证性,而且减少了一个双线性对运算,具有较高的效率。 Two identity-based designated verifier signature schemes,which were proposed by Zhang and Li-Zheng-Zhu respectively,were analyzed.It was shown that two schemes did not satisfy the security requirements of designated verifier signature.Zhang's scheme did not meet the unforgeability requirement;Li-Zheng-Zhu's scheme did not have designated verification as although the non-designated-verifier could check the validity of the signatures.Then the schemes were improved.The improved Zhang's scheme owns unforgeability property,and has the same efficiency as the Zhang's.The improved Li-Zheng-Zhu's scheme owns designated verification property;moreover,the improved scheme has reduced one bilinear paring and is more efficient than the Li-Zheng-Zhu's.
出处 《计算机应用》 CSCD 北大核心 2010年第5期1227-1229,共3页 journal of Computer Applications
基金 教育部科学技术研究重点项目(208148) 甘肃省教育厅重点项目(0801-01)
关键词 基于身份签名 指定验证者签名 短签名 双线性对 identity-based signature designated verifier signature short signature bilinear pairing
  • 相关文献

参考文献7

  • 1JAKOBSSON M,SAKO K,IMPAGLIAZZO R.Designated verifier proofs and their applications[C]//Cryptology-EUROCRYPT 1996,LNCS 1070.Berlin:Springer-Verlag,1996:142-154.
  • 2SUSILO W,ZHANG FANGGUO,MU YI.Identity based strong designated verifier signature schemes[C]//ACISP'2004:Proceedings of the 9th Australasian Conference on Information Security and Privacy,LNCS 3108.Berlin:Springer-Verlag,2004:313-324.
  • 3KUMAR K P,SHAILAJA G,SAXENA A.Identity based strong designated verifier signature scheme[EB/OL].[2009-09-22].http://eprint.iacr.org/2006/134.pdf.
  • 4ZHANG J,MAO J.A novel id-bascd designated verifier signature scheme[J].Information Sciences,2008,178(3):766-773.
  • 5张学军.高效的基于身份的指定验证者签名[J].计算机工程,2009,35(5):131-132. 被引量:6
  • 6李明祥,郑雪峰,朱建勇,闫鹏.一种高效的基于身份的强指定验证者签名方案[J].四川大学学报(工程科学版),2009,41(4):176-180. 被引量:5
  • 7]BONEH D,LYNN B,SHACHAM H.Short signature from the Weil pairing[C]// Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology,LNCS 2248.Berlin:Springer-Verlng,2001:514-532.

二级参考文献16

  • 1Jakobsson M, Sako K, Impagliazzo R. Designated Verifier Proofs and Their Applications[C]//Proceedings of Eurocrypt'96. Berlin, Germany: Springer-Verlag, 1996.
  • 2Shamir A. Identity-based Cryptosystems and Signature Schemes[C]//Proceedings of Crypto'84. Berlin, Germany: SpringerVerlag, 1984.
  • 3Boneh D, Franklin M. Identity-based Encryption from the Weil Pairing[C]//Proc. of Crypto'01. Berlin, Germany: Springer-Verlag, 2001.
  • 4Boneh D, Lynn B, Shacham H. Short Signature from the Weil Pairing[C]//Proc. of Crypto'01. Berlin, Germany: Springer-Verlag, 2001.
  • 5Kumar K, Shailaja G, Saxena A. Identity Based Strong Designated Verifier Signature Scheme[EB/OL]. (2006-06-20). http://eprint.iacr. org/2006/134.pdf.
  • 6Zhang Jianhong, Mao Jane. A Novel Id-based Designated Verifier Signature Scheme[J]. Information Sciences, 2008, 178(3): 766-773.
  • 7Saeednia S,,Kremer S,Markowitch O.An efficient strongdesignated verifier signature scheme[].Proceedings ofthe th International Conference on Information Security andCryptology(ICISC‘).2004
  • 8Shamir A.Identity-based cryptosystems and signatureschemes[].Proceedings of Crypto.1984
  • 9Susilo W,Zhang F,Mu Y.Identity-based strong designat-ed verifier signature schemes[].Proceedings of the thAustralasian Conference on Information Security and Privacy(ACISP’).2004
  • 10Kang B,Boyd C,Dawson E.A novel identity-basedstrong designated verifier signature scheme[].The JournalOf Systems And Software.2009

共引文献9

同被引文献12

  • 1李明祥,郑雪峰,朱建勇,闫鹏.一种高效的基于身份的强指定验证者签名方案[J].四川大学学报(工程科学版),2009,41(4):176-180. 被引量:5
  • 2GENTRY C. Certificate-based encryption and the certificate revocation problem[A].Beilin:Springer-Verlag,2003.272-293.
  • 3KANG B G,PARK J H,HAHN S G. A certificate-based signature scheme[A].Beilin:Springer-Verlag,2004.99-111.
  • 4LI J G,HUANG X Y,MU Y. Certificate-based signature:security model and efficient construction[A].Beilin:Springer-Verlag,2007.110-125.
  • 5LI J G,XU L Z,ZHANG Y C. Provably secure certificate-based proxy signature schemes[J].Journal of Computers,2009,(06):444-452.
  • 6LI J G,HUANG X Y,ZHANG Y C. An efficient short certificate-based signature scheme[J].Journal of Systems and Software,2012,(2012):314-322.
  • 7JAKOBSSON M,SAKO K,IMPAGLIAZZO R. Designated verifier proofs and their applications[A].Beilin:Springer-Verlag,1996.143-154.
  • 8SAEEDNIA S,KREMER S,MARKOWITCH O. An efficient strong designated verifier signature scheme[A].Beilin:Springer-Verlag,2004.40-54.
  • 9SUSILO W,ZHANG F T,MU Y. Identity-based strong designated verifier signature schemes[A].Beilin:Springer-Verlag,2004.313-324.
  • 10ZHANG J,MAO J. A novel ID-based designated verifier signature scheme[J].Information Sciences,2008,(03):766-773.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部