期刊文献+

标准模型下的在线/离线多签名方案 被引量:2

Online /offline multi-signature scheme in standard model
下载PDF
导出
摘要 在线/离线多签名能够使多个用户对同一个消息快速地生成一个签名数据,此数据可以使验证者验证签名者的身份。签名生成过程中所需的大部分运算都在签名的消息给出之前进行,即进行预运算。在给出消息之后,再进行少量的运算得出签名。定义在线/离线多签名及其安全性,在Guo等人提出的在线/离线签名方案的基础上,运用Lu等人构造多签名的方法构造出一个具体方案。在标准模型下可证明它的安全性,并且阐述其高效性。 Online/offline multi-signature schemes allowed multiple users to efficiently sign on a common message and then generated a single signature. This paper convinced the verifiers that who had signed on the message. Computed most computations before the message was given. Only small quantities of computations were needed after the message was available. Gave the formal definition of the online/offline multi-signature and the security notion. Based on the online/offline signature proposed by Guo,with the method that used by Lu et al to construct multi-signature,gave a concrete scheme. It could be proven secure in the standard model,and it was efficient.
作者 卢超 钱海峰
出处 《计算机应用研究》 CSCD 北大核心 2010年第9期3514-3517,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60703004)
关键词 签名 在线/离线签名 多签名 标准模型 公钥模型 signatures online/offline signature multi-signature standard model key model
  • 相关文献

参考文献19

  • 1EVEN S,GOLDREICH O,MICALI S V.On-line/off-line digital signatures[C]//Proc of Advances in Cryptdogy.New York:Springer-Verlag,1989:263-275.
  • 2SHAMIR A,TAUMAN Y.Improved online/offline signature schemes[C]//Proc of the 21st Annual International Cryptology Conference on Advances in Cryptology.London:Springer-Verlag,2001:355-367.
  • 3GIRAULT M,POUPARD G,STERN J.On the fly authentication and signature schemes based on groups of unknown order[J].Journal Cryptology,2006,19(4):463-487.
  • 4CHEVALLIAR-MAMES B,JOYE M.A practical and tightly secure signature scheme without hash function[C]//Proc of CT-RSA 2007.[S.l.]:Springer,2007:339-356.
  • 5JOYE M.An efficient online/offline signature scheme without random oracles[C]//Proc of CANS 2008.[S.l.]:Springer,2008:98-107.
  • 6GUO Fu-chun,MU Yi.Optimal online/offline signature:how to sign message without online computation[C]//Proc of the 2nd Internatio-nal Conference on Provable Security.Berlin/Heidelberg:Springer-Verlag,2008:98-111.
  • 7MICALI S,OHTA K,REYZIN L.Accountable-subgroup multi-signatures:extended abstract[C]//Proc of ACM Conference on Compu-ter and Communications Security.[S.l.]:ACM Press,2001:245-254.
  • 8BOLDYREVA A.Threshold signature,multisignatures,multisignatures and blind signatures based on gap-Diffie-Hellman-group signature scheme[C]//Proc of Public Key Crypotgraphy.Berlin/Heidelberg:Springer,2003:31-46.
  • 9LU S,OSTROVSKY R,SAHAI A,et al.Aggregate sequential signatures and multi-signatures without random oracle[C]//Proc of EUROCRYPT.[S.l.]:Springer,2006:465-485.
  • 10BELLARE M,NEVEN G.Multi-signatures in the plain public-key model and a general forking lemma[C]//Proc of ACM Conference on Computer and Communication Security.[S.l.]:ACM Press,2006:390-399.

同被引文献12

  • 1Shamir A,Tauman Y. Improved online/offline signatureschemes [ C ] //Proc. of the 21st Annual InternationalCryptology Conference on Advances in Cryptology. London:Springer-Verlag, 2001 : 355 - 367.
  • 2Girault M,Poupard G,Stem J. On the fly authentication andsignature schemes based on groups of unknown order [ J ].Journal of Cryptology, 2006, 19 ( 4) : 463 -487.
  • 3Bellare M,Neven G. Multi-signatures in the plain public-keymodel and a general forking lemma [ C ] //Proceedings of13th ACM Conference on Computer and Communications Secu-rity. New York: ACM Press, 2006: 390-399.
  • 4Bagherzandi A,Cheon J H, Jarecki S. Multi-signatures se-cure under discrete logarithm assumption and a generalized for-king lemma [C] //Proceedings of the 15th ACM Conferenceon Computer and Communication Security. New York: ACMPress, 2008: 449-458.
  • 5Boldyreva A. Threshold signature, multisignatures, multisigna-tures and blind signatures based on gap-Diffie-Hellman-groupsignature scheme[ M]//Public Key Crypotgraphy - PKC 2003.Berlin Heidelberg: Springer,2003 ; 31 -46.
  • 6Boneh D, Lynn B,Shacham H. Short signatures from theweil pairing [ J]. Journal of Cryptology, 2004, 17 ( 4):297 -319.
  • 7Steiner M, Tsudik G, Waidner M. Diffie-Hellman key distri-bution extended to group communication [ C ] //Proceedingsof the ACM Conference on Computer and Communications Se-curity. New York: ACM Press, 1996: 31 -37.
  • 8Shamir A, Tauman Y. Improved online offline signatureschemes [ C ] //Advances in Cryptology-CRYPTO 2001.Berlin Heidelberg: Springer-Verlag, 2001 : 355 -367.
  • 9Krawczyk H,Rabin T. Chameleon hashing and signatures[C]//Proceedings of Symposium on Network and Distribu-ted Systems Security. San Diego, 2000: 143 -154.
  • 10王巍,马建峰,杨世平,赵文红.动态对等群组中高效安全的群组密钥管理方案[J].吉林大学学报(工学版),2008,38(1):131-136. 被引量:4

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部