期刊文献+

基于身份的改进门限代理重签名方案 被引量:1

Improved ID-based Threshold Proxy Re-signature Scheme
下载PDF
导出
摘要 在基于身份的代理重签名方案的基础上,提出一种无随机预言机的基于身份的双向门限代理重签名方案。在标准模型下对该方案进行安全性证明,表明该方案是健壮的,能抵抗适应性选择身份和消息攻击。系统公开参数少于标准模型下其他基于身份的门限代理重签名方案,且方案的安全性紧归约到q-SDH问题的安全性。 Based on ID-based proxy re-signature,an ID-based bidirectional threshold proxy re-signature scheme without random oracles is presented,and its security in the standard model is proved.The analysis result shows that it is robust and secure against existential forgery under the adaptive chosen identity and message attacks.The length of public parameters of the scheme is shorter than that of previously known ID-based bidirectional threshold proxy re-signature scheme in the standard model,and the security of the scheme is tightly reduced to the security of the q-Strong Diffie-Hellman(q-SDH) problem.
作者 朱月珍
出处 《计算机工程》 CAS CSCD 北大核心 2011年第7期125-126,129,共3页 Computer Engineering
基金 甘肃省自然科学基金资助项目(0710RJZA072)
关键词 门限代理重签名 基于身份 可证安全 标准模型 q-SDH问题 threshold proxy re-signature ID-based provably secure standard model q-Strong Diffie-Hellman(q-SDH) problem
  • 相关文献

参考文献6

  • 1Blaze M,Bleumer G,Strauss M.Divertible Protocols and Atomic Proxy Cryptography[C]//Proc.of EUROCRYPT'08.Berlin,Germany.Springer-Verlag,1998:127-144.
  • 2YANG Xiaodong WANG Caifen.Threshold Proxy Re-signature Schemes in the Standard Model[J].Chinese Journal of Electronics,2010,19(2):345-350. 被引量:8
  • 3Yang Piyi,Cao Zhenfu,Dong Xiaolei.Threshold Proxy Re-signature[C]//Proc.of IPCCC'08.Austin,USA:[s.n.],2008:450-455.
  • 4孙超亮,曹珍富,梁晓辉.门限代理重签名方案[J].计算机工程,2009,35(4):128-130. 被引量:5
  • 5Hu Xiaoming,Zhang Zhe,Yang Yinchun.Identity-based Proxy Re-signature Schemes Without Random Oracle[C]//Proc.of Int'l Conference on Computational Intelligence and Security.Beijing,China:[s.n.],2009:256-259.
  • 6Mao Wenbo.Modern Cryptography:Theory and Practice[M].[S.l.]:Prentice Hall PTR,2003.

二级参考文献5

  • 1Blaze M, Bleumer G, Strauss M. Divertible Protocols and Atomic Proxy Cryptography[C]//Proc. of EUROCRYPT'98. Berlin, Germany: Springer-Verlag, 1998: 127-144.
  • 2Ateniese G, Hohenberger S. Proxy Re-signatures: New Definitions, Algorithms, and Applications[C]//Proc. of the 12th ACM Conference on Computer and Communications Security, Alexandria, VA, USA: [s. n.], 2005: 310-319.
  • 3Desmedt Y, Frankel Y. Shared Generation of Authenticators and Signatures[C]//Proc. of CRYPTO'91. Berlin, Germany: Springer- Verlag, 1991.
  • 4Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 5Boneh D, Shacham H, Lynn B. Short Signatures from the Weil Pairing[C]//Proc. of ASIACRYPT'01. Berlin, Germany: Springer-Verlag, 2001 : 514-532.

共引文献10

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部