期刊文献+

多个签名者强指定验证者签名方案

Multi-signers strong designated verifier signature scheme
下载PDF
导出
摘要 指定验证者签名可以实现签名者选择所期望的验证者验证签名的有效性,从而达到控制数字签名任意传播的目的,基于双线性对构造了一个新的基于身份的多签名者强指定验证者签名方案。新方案中多个签名者将隐藏的私钥以及进行哈希的消息发送给签名收集者,使得签名收集者无法利用签名者的私钥任意伪造签名,也不能对任意的消息进行签名,由签名收集者进行的多签名者强指定验证者签名方案缩短了签名时间和签名长度,并且减小了单个签名者权利过大的可能性。该签名体制可以用于多人联名上书的情况。新方案在BDH问题和DLP问题的困难性假设下,在基于身份的多签名者强指定验证者签名的不可伪造性和不可转发性概念下是安全的。 Designated verifier signature schemes can be used to realize a new destination that a signer can choose a desired verifier to verify the availability of the signatures,which can be used to prevent the abuse of the signature.An ID-based multi-signers strong designated verifier signature scheme is proposed from bilinear pairings.In the new schemet,he multi-signers send the hidden private key and the hash of the message to the signature collector,making signature collector can not use any of the singer’s private key to forge signature and can not sign any message.The scheme reduces the time and the length of the signature and avoids the too large possibility of the rights of a single singer.The signature system can be used for joint petition.This paper proves that the scheme is secure in the sense of unforgeability and untransferability notions for the new schemes,under the hypothesis of BDH and DLP.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第36期105-108,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.60873268) 陕西省教育厅2009年度科学研究计划项目(No.09JK660)~~
关键词 基于身份 多签名者 双线性对 ID-based multi-singers bilinear pairings
  • 相关文献

参考文献11

  • 1Jakobsson M,Sako K,Impagliazzo R.Designated verifier proofs and their applications[C]//LNCS 1070:International Conference on the Theory and Application of Cryptographic Techniques Ad-vances in Cryptology,EUROCRYPT'96,Saragossa,Spain,May 12-16 1996.Berlin:Springer-Verlag,1996:143-154.
  • 2Saeednia S,Kramer S,Markovitch O.An efficient strong desig-nated verifier signature scheme[C]//LNCS 2971:6th Internation-al Conference,Information Security and Cryptology-ICISC 2003,Korea,November 27-28.Berlin:Springer-Verlag,2004:40-54.
  • 3Susilo W,Zhang Fangguo,Mu Yi.Identity-based strong designat-ed verifier signature schemes[C]//LNCS 3108:9th Australasian Conference,Information Security and Privacy,Sydney,July 13-15.Berlin:Springer-Verlag,2004:313-324.
  • 4Hess F.Exponent group signature schemes and efficient identity based signature schemes based on pairings[EB/OL].http://eprint.iacr.org/2002/012.
  • 5Itakura K,Nakamura K.A public-key cryptosystem suitable for digital multi-signature[J].ACM Transactions on Computer Sys-tems,1988,6(4):432-441.
  • 6Lin C Y,Wu T C.A structured multisignature scheme from the gap Diffie-Hellman group[EB/OL].http://eprint.iacr.org/2003/090.
  • 7Micali S,Ohta K,Reyzin L.Accountable-subgroup multisigna-tures[M].New York:ACM Press,2000:245-254.
  • 8Ohta K,Okamoto T.Multi-signature scheme secure against ac-tive insider attacks[J].IEICE Transactions on Fundamentals of Electronics:Communications and Computer Sciences,1999,82(1):21-31.
  • 9Paterson K G.ID-based signatures from pairings[EB/OL].http://eprint.iacr.org/2003/054.
  • 10Chow S S M.Identity-based strong multi-designated verifiers signatures[C]//LNCS 4043:Public Key Infrastructure,3rd Euro-pean PKI Workshop:Theory and Practice,Italy,June 19-20.Ber-lin:Springer-Verlag,2006:257-259.

二级参考文献8

  • 1M Burmester,Y Desmedt,H Doi et al.A structured E1Gamal-type multisignature scheme[C].In:Proceedings of Third International Workshop on Practice and Theory in Public Key Cryptosystem(PKC 2000),2000:466~483
  • 2F Hess.Exponent group signature schemes and efficient identity based signature schemes based on pairings.http://eprint.iacr.org/2002/012
  • 3K Itakura,K Nakamura. A public-key crypto-system suitable for digital multisignature[J].NEC Research and Development,1983;71:1~8
  • 4C Y Lin,T C Wu,F Zhang. A structured multisignature scheme from the gap Diffie-Hellman group.http://eprint.iacr.org/2003/090
  • 5S Micali,K Ohta,L Reyzin. Accountable-subgroup multisignatures[C].In:ACM Conference on Computer and Communications Security 2001(CCS 2001) ,2001:245~254
  • 6K Ohta,T Okamoto. Multi-signature scheme secure against active insider attacks[C].In:IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 1999;E82-A(1) :21~31
  • 7K G Paterson. ID-based signatures from pairings on elliptic curves.http://eprint .iacr.org/2003/004.
  • 8A Shamir. Identity-based cryptosystems and signature schemes[C].In:Proceedings of Crypto′84,LNCS 196,1985:47~53

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部