期刊文献+

无证书一次代理签名(英文)

Certificateless One-Time Proxy Signature
下载PDF
导出
摘要 为了解决密钥托管问题,Al-Riyami和Paterson提出了无证书签名方案.通过修改陆等人基于身份的一次代理签名方案密钥的产生算法,提出了无证书一次代理签名方案,并且正式定义了无证书一次代理签名方案的安全模型.在随机预言机模型下,证明方案的安全性依赖于CDH困难问题. To solve the key escrow problem, Al-Riyami and Paterson introduced the concept of certificateless signature scheme (CLS). This paper has proposed the certificateless one-time proxy signature scheme which modifying the key generation algorithms of Lu et al. 's ID-based one-time proxy signature scheme and formalized the security notions for certificateless one-time proxy signature scheme (CLOTPS) are formalized in this paper. The security of the proposed scheme is proved to be equivalent to the computational Diffie-Hellman (CDH) problem in the random oracle model.
作者 洪东招
出处 《杭州师范大学学报(自然科学版)》 CAS 2010年第5期339-343,378,共6页 Journal of Hangzhou Normal University(Natural Science Edition)
关键词 无证书 一次代理签名 随机预言机模型 certificatelss one-time proxy signature random oracle model
  • 相关文献

参考文献23

  • 1Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1353.
  • 2Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[C]//In Proc.3rd ACM Conference on Computer and Communications Security-CCS'96.New York:ACM Press,1996:48-57.
  • 3Sun Hungmin.An efficient nonrepudiable threshold proxy signatures with known signers[J].Computer Communications,1999,22(8):717-722.
  • 4Sun H,Lee N Y,Hwang T.Threshold proxy signatures[J].IEE Proceedings-Computes and Digital Technique,1999,146:259-263.
  • 5Hwang S J,Shi C H.A simple multi-proxy signature scheme[C]//In Proceedings of the Tenth National Conference on Information Security,Hualien:2000:134-138,.
  • 6Yi Lijing,Bai Guoqiang,Xiao Guozheng.Proxy multi-signature scheme:a new type of proxy signature scheme[J].Electroinics Letter,2000,36(6):527-528.
  • 7Huang Xinyi,Mu Yi,Susilo W,et al..Short designated verifier proxy signature from pairings[C]//In Proc.of the SecUbiq 2005,LNCS3823.Berlin:Springer-Verlag,2005:835-844.
  • 8Zhang Fangguo,Kim K.Efficient ID-based blind signature and proxy signature from bilinear pairings[J].Lecture Notes in Computer Science,2003,2727/2003:218-219.
  • 9Kim H,Baek J,Lee B,et al.Secret computation with secrets for mobile agent using one-time proxy signature[C]//In Symp.on Cryptography and Information Security-SCIS 2000.New York:IEEE press,2001:845-850.
  • 10Choi C,Kim Z,Kim K.Schnorr signature scheme with restricted signing capability and its application[C]//In Proc.Computer Security Symp-CSS'03.New York:ACM Press,2003:385-390.

二级参考文献11

  • 1Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the power to sign messages. IEICE Trans. on Fundamentals, 1996, E79-A(9): 1338-1353.
  • 2Zhang k Threshold proxy signature schemes. In: Proc. of the 1997 Information Security Workshop. Japan, 1997. 191-197.
  • 3Yi LJ, Bai GQ, Xiao GZ. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 2000,36(6): 527-528.
  • 4Huang XY, Mu Y, Susilo W, Zhang FT. Short designated verifier proxy signature from pairings. In: Proc. of the SecUbiq 2005. LNCS3823, Nagasaki, Springer-Verlag, 2005. 835-844.
  • 5Zhang FG, Kim-K. Efficient 1D-based-blind signature and proxy signature from bilinear pairings. In: Safavi-Naini R, Seberry J, eds. Proc. of the ACISP 2003. LNCS 2727, Springer-Verlag, 2003. 312-323.
  • 6Al-Riyami S, Paterson K. Certificateless public key cryptography. In: Prec. of the Asiacrypt 2003. LNCS 2894, Springer-Verlag, 2003. 452-473.
  • 7Huang XY, Mu Y, Susilo W, Wong DS, Wu W. Certificateless signature revisited. In: Proc. of the Acisp 2007. LNCS 4586, Springer-Verlag, 2007. 308-322.
  • 8Zhang ZF, Wong DS, Xu J, Feng DG. Certificateless public-key signature: Security model and efficient construction. In: Zhou J, Yung M, Bao F, eds. Proc. of the ACNS 2006. LNCS 3989, Springer-Verlag, 2006. 293-308.
  • 9Li X, Chen K, Sun L. Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal, 2005,45(1 ):76-83.
  • 10Lu R, He D, Wang CJ. Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings. In: Proe. of the 8th ACIS Int'l Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. 2007. 285-290. doi: 10.1109/SNPD.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部