期刊文献+

一个高效的基于身份的聚合签名方案 被引量:7

An Efficient Identity-based Aggregate Signature Scheme
下载PDF
导出
摘要 聚合签名可以把n个签名者对n个不同消息的签名聚合成一个签名,从而能使n个签名的验证等式减少为一个验证等式。针对目前已有的基于身份的聚合签名方案效率和安全性不能兼顾这一问题,利用双线性对构造了一个安全高效的基于身份的聚合签名方案,在随机预言机模型下给出了方案的安全性证明,其安全性可紧的规约为计算Diffie-Hellman问题。与已有的基于身份的聚合签名相比,本文方案更能提高签名验证与传输效率,因签名的验证只需计算3个双线性对,签名的长度只有320 bits。 An aggregate signature scheme can aggregate n signatures on n distinct messages from n distinct signers into a single signature.Thus,n verification equations can be reduced to one.Since the existing identity-based aggregate signature scheme can not achieve both high efficiency and safety simultaneously,a secure and efficient identity-based aggregate signature scheme was proposed using bilinear pairings.Its security proof was given in the random oracle model and it could be tightly reduced to computational Diffie-Hellman problem.Compared with the existing ID-based aggregate signature schemes,this scheme greatly improves the efficiency of signature communication and verification since the verification algorithm only requires 3 pairing evaluations and the size of the signature generated by this scheme is only about 320 bits.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2011年第1期87-90,96,共5页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(60873191) 陕西省自然科学基础研究计划资助项目(2010JM2016) 宝鸡文理学院博士重点科研项目(ZK0952)
关键词 基于身份的密码系统 聚合签名 双线性对 identity-based cryptography aggregate signature bilinear pairings
  • 相关文献

参考文献12

  • 1Boneh D, Gentry C, Lynn B, et al. Aggregate and verifiably encrypted signatures from bilinear maps [ C]//Advanees in Cryptology-Eurocrypt 2003. LNCS 2656, Springer-Verlag, 2003:416 - 432.
  • 2Xu Jing, Zhang Zhenfeng, Feng Dengguo. ID-based aggregate signatures from bilinear pairings [ C ]//Proceedings of CANS 2005. LNCS 3810, Springer-Verlag,2005 : 110 - 119.
  • 3Gentry C, Ramzan Z. Identity-based aggregate signatures [ C ]//Proceedings of PKC 2006. LNCS 3958,2006 : 257 - 273.
  • 4Song J, Kim H, Lee S, et al. Security enhancement in Ad Hoc network with ID-based cryptosystem [ C ]//Proceedings of ICACT 2005. 2005:572 -376.
  • 5Bellare M, Namprempre C, Neven G. Unrestricted aggregate signatures [ C ]//Proceedings of ICALP 2007. LNCS 4596, Springer-Verlag, 2007 :411 - 422.
  • 6Li J, Kim K, Zhang F, et al. Aggregate proxy signature and verifiably encrypted proxy signature [ C ]//Proceedings of ProvSec 2007. LNCS 4784, Springer-Verlag, 2007:208 - 217.
  • 7Cheng X, Liu J, Wang X. Identity-based aggregate and verifiably encrypted signatures from bilinear pairing [ C ]//Proceedings of ICCSA 2005. LNCS 3483, Springer-Verlag, 2005 : 1 046 - 1 054.
  • 8Wang Zhu, Chen Huiyan, Ye Dingfeng, et al. Practical identity-based aggregate signature scheme from bilinear maps [ J ]. Journal of Shanghai Jiaotong University: English Edition, 2008,13 (6) :684 - 687.
  • 9Wen Yiling, Ma Jianfeng. An aggregate signature scheme with constant pairing operations [ C ]//Proceedings of CSSE. IEEE Computer Society ,2008 ( 3 ) :830 - 833.
  • 10Shamir A. Identity-based cryptosystems and signature schemes [ C ]//Proceedings of Crypto' 84. Santa Barbara, CA, 1984:47 - 53.

同被引文献64

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部