期刊文献+

简单的通用可组合代理重签名方案 被引量:7

Simplified Universally Composable Proxy Re-Signature
下载PDF
导出
摘要 给出一个简单的代理重签名方案及其两个等价的安全模型:基于通用可组合安全框架的安全模型和基于游戏的安全模型.提出的方案是双向的、多用的、可传递的和密钥最优化的,其安全性可以规约到随机预言机模型下的计算Diffie-Hellman假设.该方案同时也满足通用可组合安全性. The paper presents a simple proxy re-signature scheme and its two equivalent security model. One is based on the universal eomposability framework, another is game-based security model. The proposed scheme is bidirectional, multi-use, transitive and key optimal. It is very attractive for its simplicity. Its security can be reduced to the Computational Diffie-Hellman assumption in the Random Oracle Model. It is also secure under the universal eomposability framework.
出处 《软件学报》 EI CSCD 北大核心 2010年第8期2079-2088,共10页 Journal of Software
基金 国家高技术研究发展计划(863)No.2007AA01Z456 国家重点基础研究发展计划(973)No.2007CB311201 现代通信国家重点实验室No.9140C1103020803 上海师范大学一般项目No.SK201037~~
关键词 代理重签名 通用可组合安全 可证明安全 proxy re-signature universally composable provable security
  • 相关文献

参考文献11

  • 1Blaze M,Bleumer G,Strauss M.Divertible protocols and atomic proxy cryptography.In:Proc.of the EUROCRYPT'98.LNCS 1403,Berlin,Heidelberg:Springer-Verlag,1998.127-144.
  • 2Ateniese G,Hohenberger S.Proxy re-signatures:New definitions,algorithms,and applications.In:Proc.of the ACM CCS 2005.Berlin,Heidelberg:Springer-Verlag,2005.310-319.
  • 3Ateniese G,Fu K,Green M,Hohenberger S.Improved proxy re-encryption schemes with applications to secure distributed storage.In:Proc.of the 12th Annual Network and Distributed System Security Symp.(NDSS 2005).Berlin,Heidelberg:Springer-Verlag,2005.29-43.
  • 4Taban G,Cárdenas AA,Gligor VD.Towards a secure and interoperable DRM architecture.In:Proc.of the ACM DRM 2006.Berlin,Heidelberg:Springer-Verlag,2006.69-78.
  • 5Shao J,Chao ZF,Wang LC,Liang XH.Proxy re-signature schemes without random oracles.In:Proc.of the Indocrypt 2007.LNCS 4859,Berlin,Heidelberg:Springer-Verlag,2007.197-209.
  • 6Ivan A,Dodis Y.Proxy cryptography revisited.In:Proc.of the 10th Annual Network and Distributed System Security Symp.(NDSS 2003).Berlin,Heidelberg:Springer-Verlag,2003.196-204.
  • 7Canetti R.Universally composable security:A new paradigm for cryptographic protocols.In:Proc.of the IEEE Symp.on Foundations of Computer Science.Berlin,Heidelberg:Springer-Verlag,2001.136-145.
  • 8Canetti R.Universally composable signature,certification,and authentication.In:Proc.of the 17th Computer Security Foundations Workshop (CSFW 2004).Berlin,Heidelberg:Springer-Verlag,2004.219-233.
  • 9Bellare M,Canetti R,Krawczyk H.A modular approach to the design and analysis of authentication and key exchange protocols.In:Proc.of the 30th Annual ACM Symp.on the Theory of Computing.ACM Press,1998.419-428.
  • 10Goldwasser S,Micali S,Rivest RL.A digital signature scheme secure against adaptive chosen message attacks.SIAM Journal of Computing,1998,17:281-308.[doi:10.1137/0217017].

同被引文献61

  • 1冯涛,梁一鑫.可证安全的无证书盲代理重签名[J].通信学报,2012,33(S1):58-69. 被引量:4
  • 2谷利泽,张胜,杨义先.一种新型的代理签名方案[J].电子与信息学报,2005,27(9):1463-1466. 被引量:18
  • 3林立忠.一种新的针对指定接收组的多重签名方案及其应用[J].太原师范学院学报(自然科学版),2006,5(4):64-67. 被引量:1
  • 4鲁荣波,何大可,王常吉,缪祥华.对一种新型代理签名方案的分析与改进[J].电子与信息学报,2007,29(10):2529-2532. 被引量:6
  • 5Mambo M, Usuda K, Okamoto E.Proxy signatures for delegating signing operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communication Security, 1996:48-57.
  • 6Hu X M, Zhang Z, Yang Y (2. Identity based proxy re-signature schemes without random oracle [C]//International Con- ference on Computational Intelligence and Security, IEEE, 2009: 11-14.
  • 7Libert B, Damien Vergnaud. Multi-use unidirectional proxy re-signatures [C] //Proceedings of the 15th ACM Conference on Computer and Communications Security. ACM, 2008: 511-520.
  • 8Shao J, Cao Z, Wang L, et al. Proxy re-signature schemes without random oracles [G]. LNCS 4859: Springer-Verlag, 2007: 197-209.
  • 9Canetti R, Hohenberger S. Chosen-ciphertext secure proxy reencryption [C] //In Proc of the ACM CCS. ACM Press, 2007: 185-194.
  • 10Hong X, Long Y. A novel unidirectional proxy re-signature scheme and its application for MANETs [J]. Journal of Computers, 2012, 7 (7): 1796-1800.

引证文献7

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部