期刊文献+

无随机预言模型下基于模糊身份的签名方案 被引量:2

Fuzzy identity based signature scheme without random oracle model
下载PDF
导出
摘要 在随机预言模型下,Hash函数被视为一个完全随机的理想模型,实际应用中却无法构造。利用椭圆曲线上的双线性对性质及门限秘密共享的思想,以Waters的签名方案为基础,设计了一种无随机预言模型的模糊身份签名方案。与已有的模糊签名方案相比,该方案的构造没有采用Hash函数,避免了Hash函数返回值无随机性的缺点;且系统公开参数少,安全性可规约到计算Diffie-Hellman(CDH)困难假定,从而能更好地满足实际应用需求。 In the random oracle model,Hash function is regarded as an ideal model of complete randomness which can't be constructed actually.Utilizing bilinear paring of elliptic curves and threshold secret share,this paper proposes a fuzzy identity based signature scheme without the random oracle model based on Waters's scheme.Compared with existing fuzzy identity based signature schemes,it doesn't use Hash function to avoid the shortcoming of non-randomuess of returned values,the system's public parameters are less and the security can be reduced to the computation Diffie-Hellman assumption so that it can better meet the needs of practical applications.
机构地区 贵州大学理学院
出处 《计算机工程与应用》 CSCD 北大核心 2011年第20期65-67,80,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.60963023) 贵州省自然科学基金项目(No.[2009]2113) 贵州大学博士基金项目(No.2007-040)~~
关键词 模糊身份 签名 双线性对 无随机预言 fuzzy identity signature bilinear pairings without random oracles
  • 相关文献

参考文献11

  • 1Sahai A, Waters B.Fuzzy identity-based encryption[C]//Advances in Cryptology-EUROCRY PT 2005.Berlin: Springer-Vedag, 2005: 457-473.
  • 2Li Xi-ming, Bo Yang, Zhang Ming-wu.New construction of fuzzy identity-based encryption[C]//2009 WASE International Conference on Information Engineering,ICIE,2009:647-651.
  • 3Baek J, Susilo W, Zhou LNew constructions of fuzzy identity-based encryption[C]//ASIACS' 07,2007: 368-370.
  • 4Fang L,Wang J,R.en Y.Chosen-eipbertext secure fuzzy identity based eneryption without ROM[J].Joumal of Shanghai Jiaotong University: Science, 2008,13 (6) : 646-650.
  • 5Yang Pi-yi,Cao Zhen-fu,Dong Xiao-lei.Fuzzy identity based signature[EB/OL]. (2008) .http://eprint.iacr.org/2008/002.pdf.
  • 6Wang Chang-ji,Chen Wei,Liu Yang.Two constructions of fuzzy identity based signature[J].Biomedical Engineedng and Informatics, 2009.
  • 7徐静.标准模型下可证安全的门限签名方案[J].计算机学报,2006,29(9):1636-1640. 被引量:15
  • 8Waters B.Efficient identity-based encryption without random oracles[C]//LNCS 3494: Advances in Cryptology-Eurocrypt 2005.Berlin: Springer-Verlag, 2005 : 114-127.
  • 9Shamir A.How to share a secret[J].Communications of the ACM, 1979,22(11) :612-613.
  • 10Burner A, Dowling T.A Biometric identity based signature scheme[EB/OL]. (2007-12-06) .http://Ieexplore.iee.org, 2007.

二级参考文献16

  • 1李梦东,杨义先,马春光,蔡满春.利用双线性聚集签名实现公平的签名交换方案[J].通信学报,2004,25(12):59-64. 被引量:7
  • 2Asokan N,Shoup V,Waidner M.Optimistic fair exchange of digital signature[J].IEEE Journal on Selected Areas in Communications, 2000, 18(4) :593-610.
  • 3Bao F,Deng R H,Mao W.Efficient and practical fair exchange protocols with off-line Tl'P[C]//Proceeding of 1998 IEEE Symp on Security and Privacy.Oakland :IEEE Computer Press, 1998 : 77-85.
  • 4Franklin M,Tsudik G.Secure group barter:muhi-party fair exchange with semi-trusted neutral parties[C]//Proceeding of FC'98. Berlin : Springer-Verlag, 1998 : 90-102.
  • 5Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]//Proceeding of Eurocrypt 2003. Berlin: Springer-Verlag, 2003 : 416-432.
  • 6Wang C H,Kuo Y S.An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability[J].ACM SIGOPS Operating Systems Review, 2000,39 (4) : 66-79.
  • 7Shamir A.. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613
  • 8Desmedt Y. , Frankel Y.. Threshold cryptosystems. In: Advances in Cryptology-Crypto 89, Lectures Notes in Computer Science 435, Berlin: Springer-Verlag, 1989, 307-315
  • 9Desmedt Y.. Threshold cryptography. European Transactions on Telecommunications, 1994, 5(4): 449-457
  • 10Bellare M. , Boldyreva A. , Palacio A.. An un-instantiable random oracle model scheme for a hybrid-encryption problem.In: Advances in Cryptology-Eurocrypt 2004, Lectures Notesin Computer Science 3027, Berlin: Springer Verlag, 2004,171-188

共引文献14

同被引文献21

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部