期刊文献+

一个新的高效无证书签名方案 被引量:3

New efficient certificateless signature scheme
下载PDF
导出
摘要 为了消除传统公钥密码系统中公钥证书的管理和传递,同时避免基于身份密码系统中的密钥托管问题,出现了无证书密码系统。基于双线性对提出了一个新的无证书签名方案。方案的签名算法只需要一个指数运算,验证算法仅需要两个对运算。方案的安全性依赖于CDH困难问题和Inv-CDH困难问题,并在随机预言机模型下,证明能够抵抗适应性选择消息攻击下的存在性伪造。 For eliminating the management and transfer of certificates in public key cryptosystem,and avoiding the inherent key escrow in identity-based cryptosystem,the concept of certificateless public key cryptosystem is introduced.In this paper,a new efficient certificateless signature scheme from bilinear pairing is presented.The signing algorithm needs one exponentiation computation,the verification algorithm only needs two pairings computation.Furthermore,the security relies on the hardness of the CDH problem and Inverse-CDH problem.Under the random oracle model,the new scheme is proved to be secure against existential forgery on adaptively chosen message attack.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第14期84-87,共4页 Computer Engineering and Applications
基金 教育部科学技术研究重点项目(No.208148) 甘肃省教育厅重点项目(No.0801-01) 西北师范大学2009年青年教师科研基金项目(No.NWNU-LKQN-09-5)
关键词 双线性对 无证书签名 CDH问题 Inv-CDH问题 bilinear pairing certificateless signature Computational Diffie-Hellman(CDH) Inverse-CDH(Inv-CDH)
  • 相关文献

参考文献15

  • 1Shamir A.Identity-bnsed cryptesystems and signature schemes[C]//LNCS:Proceedings of Crypto84 on Advances in Cryptolngy.New York:Springer-Verlag,1984:47-53.
  • 2Al-Riyami S S,Paterson K G.Certificateless public key cryptngraphy[C]//LNCS 2894:Cryptology-Asiacrypt2003.[S.l.]:Springer,2003:452-473.
  • 3Huang X,Susilo W,Mu Y,et al.On the security of certificsteless signature schemes from asiacrypt2003[C]//LNCS 3810:CANS 2005.Heidelberg:Springer,2005:13-25.
  • 4Yum D H,Lee P J.Generie construction of eertifieateless signature[C]//LNCS 3108:ACISP 2004.Heidelberg:Springer,2004:200-211.
  • 5Zhang Z,Wong D.Certifieateless public-key sigosture:Security model and efficient construetion[C]//LNCS 3989:ACNS 2006.Heidelberg:Springer,2006:293 -308.
  • 6Cao X,Paterson K G,Kou W.An attack on a certifleateless signature scheme[C/OL]//Cryptology ePrint Arehive.http://epriat.iacr.org/2006/367.
  • 7Gorantla M C,Saxena A.An efficient certificateless signature scheme[C]//LNCS (LNAI) 3802:CIS2005.Heidelberg:Springer,2005:110-116.
  • 8Park J HAn attack on the certifieateless signature scheme from EUC Workshops2006[C/OL]//Cryptology ePrint Archive.http://eprint.iacr.org/2006/442.
  • 9Yap W S,Heng S H,Goi B M.An efficient certifieateless signature scheme[C]//LNCS 4097.Heidelberg:Springer,2006:322-331.
  • 10Hu B C,Wong D S,Zhang Z,et al.Key replacement attack against a generic construction of certificsteless signature[C]//LNCS 4058:ACISP2006.Heidelberg:Springer,2006:235-246.

二级参考文献10

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology-Crypto'84. Berlin: Springer-Verlag, 1985, LNCS 196: 7-53.
  • 2AL-RIYAMI S S, PATERSON K G Certificateless public key cryptography[C]//Advances in Cryptography-Asiacry- pt'03. Berlin: Springer-Verlag, 2003, LNCS 2894: 452-473.
  • 3HUANG Xin-yi, SUSILO W, Mu Y, et al. On the security of certificateless signature schemes from Asiacrypt 2003[C]// International Conference on Cryptology and Network Security-CANS'05. Berlin: Springer-Verlag, 2005, LNCS 3810: 13-25.
  • 4CHOUDARY G M, ASHUTOSH S. An efficient certificateless signature scheme[C]//Computational Intelligence and Security-CIS'05. Berlin: Springer-Verlag, 2005, LNAI 3802: 110-116.
  • 5LI X, CHEN K. Certificateless signature and proxy signature schemes from bilinear pairings[J]. Lietuvos Matematikos Rinkinys, 2005, 45(1): 95-103.
  • 6BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
  • 7BARRETO P S L M, LIBERT B, McCullagh N, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps[C]//Advances in Cryptology-Asiacrypt'05. Berlin: Springer-Verlag, 2005, LNCS 3788:515-532.
  • 8BARRETO P S L M, KIM H Y, LYNN B, et al. Efficient algorithms for pairing-based cryptosystems[C]//Advances in Crptology-Crypto'02. Berlin: Springer-Verlag, 2002, LNCS 2442: 354-368.
  • 9ZHANG F, SAFAVI-NAINI signature scheme from R, SUSILO W. An efficient bilinear pairings and its applications[C]//Practice and Theory in Public Key Cryptography-PKC'04. Berlin: Springer-Verlag, 2004, LNCS 2947: 277-290.
  • 10BELLARE M, ROGAWAY P. Random oracles are practical: a paradigm for designing efficient protocols[C]// ACM Conference on Computer and Communications Security- ACMCCS'93. [S.l.]: ACM Press, 1993: 62-67.

共引文献17

同被引文献26

  • 1Castro R, Dahab R.Two notes on the security of certificateless signatures[C]//LNCS 4784: ProvSec 2007.Berlin: Springer-Verlag, 2007:85-102.
  • 2AI-Riyami S,Paterson K.Certificateless public key cryptography[C]// LNCS 2894: ASIACRYPT 2003.Berlin: Springcr-Verlag, 2003: 452-473.
  • 3Huang X,Susilo W,Mu Y,et al.On the security of certificateless signature schemes from Asiacrypt 2003[C]//LNCS 3810: CANS 2005.Berlin: Springer-Verlag, 2005 : 13 -25.
  • 4Zhang Z F,Wong D S,Xu J,et al.Certificateless public-key sig- nature: Security model and efficient construction[C]//LNCS 3989: ACNS 2007.Berlin:Springer-Verlag,2006:293-308.
  • 5AL-RIYAMI S, PATERSON K G. Certifieateless public key cryp- tography [ C] // Advances in Cryptology - ASIACRYPT 2003, LNCS 2894. Berlin: Springer-Verlag, 2003:452-473.
  • 6CHOI K Y, PARK J H, LEE D. Efficient certificateless signature schemes [ C]// Proceedings of the 5th International Conference on Applied Cryptography and Network Security. Berlin: Springer-Ver- lag, 2007:443 -458.
  • 7Shamir A.Identity-based cryptosystems and signature schemes. Advances in Cryptology-Proceedings of CRYPTO’84 . 1985
  • 8Diffie W,Hellman M E.New Directions in Cryptography. IEEE Transactions on Information Theory . 1976
  • 9Al-Riyami SS,Paterson KG.Certificateless public key cryptography. Advances in Cryptography-Asiacry-pt’03 . 2003
  • 10Zhang Z,Duncan S,Wong J,et al.Certificateless public-key signature:Security model and efficient construction. Advance in Applied Cryptography and Network Security2006 . 2006

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部