期刊文献+

标准模型下一种新的基于分级身份的短签名方案 被引量:3

A New Construction of Short Hierarchical Identity-Based Signature in the Standard Model
下载PDF
导出
摘要 基于分级身份的签名在大规模网络中具有重要应用前景,为克服已有方案的私钥或签名长度依赖于分级级数及最大分级级数的缺陷,提高计算效率,提出了一种新的基于分级身份的签名方案.与已有方案相比,新方案优势明显,如身份分级级数越大,私钥长度越短,且签名长度为常数,仅含有3个群元素.验证算法仅需要3个双线性对运算,同样不依赖于分级级数.另外,新方案的安全性建立在推广的选择身份安全模型,该模型为适应性选择身份安全模型及选择身份安全模型的推广,在计算h-CDH困难假设下,新方案被证明是安全存在性不可伪造的,且其安全性不依赖于随机预言机.与已有的标准模型下的分级方案相比,新方案的安全性基于的困难假设更具有一般性. Hierarchical identity based signature (HIBS) has wide application in large scale networks. However, the existing work cannot solve the trade-off between security and efficiency. The main challenge at present is to construct a high efficient and strongly secure HIBS with low computation cost. To overcome the drawbacks in the previous work, a new hierarchical identity-based signature scheme is introduced. The proposed scheme has some advantages over the available. For examples, the private keys size shrinks as the identity depth increases, the signature only consists of three group elements and three bilinear pairs are needed in verifying algorithm, which are independent of hierarchy depth. Furthermore, the security of the new scheme is based on the general selective-identity security model(Gs-ID) which is a general security model based on full security model and selective identity model. Under the h-computational Diffie-Hellman exponent problem (h-CDH) assumption, our scheme is proven to be secure against Gs-ID and adaptive chosen message attack. In addition, the security analysis does not rely on the random oracles. The assumption in our scheme is more natural than many of the hardness assumptions recently introduced to HIBS in the standard model, which solves the trade-off between the security and computation efficiency.
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第8期1357-1362,共6页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60970119 60803149) 国家"九七三"重点基础研究计划基金项目(2007CB311201) 陕西省自然科学基金项目(2010JQ8004)
关键词 基于分级身份的签名 标准模型 h-CDH问题 可证明安全 推广的选择身份安全模型 Key words hierarchical identity-based signature standard model h-CDH problem provably secure general selective-identity security model
  • 相关文献

参考文献19

  • 1Shamir A. Identity-based cryptosystems and signature schemes[C] //LNCS 196.. Proc of the Advances in Cryptography-Crypto'84. Berlin: Springer, 1984:47-53.
  • 2Waters B. Efficient identity-based encryption without random oracles [G] //LNCS 3494 Cryptography--Eurocrypt'05 127 Proc of the Advances in Berlin: Springer, 2005: 114-127.
  • 3胡亮,刘哲理,孙涛,刘芳.基于身份密码学的安全性研究综述[J].计算机研究与发展,2009,46(9):1537-1548. 被引量:18
  • 4Paterson K G, Schuldt J C. Efficient identity-based signatures secure in the standard model [G] //LNCS 4058: Proe of Information Security and Privacy-ACISP'06. Berlin: Springer, 2006:207-222.
  • 5Gentry C, Silverberg A. Hierarchical ID-based cryptography [G] //LNCS 2501: Proc of the Advances in Cryptography- Asiacrypt'02. Berlin: Springer, 2002:548-566.
  • 6Boneh D, Boyen X. Efficient seleetive-ID secure identity based encryption without random oracles [G] //LNCS 3027: Proc of the Advances in Cryptography-Eurocrypt'04. Berlin: Springer, 2004:223-238.
  • 7Chow S M, Hiu C K, Yiu S M, et al. Secure hierarchical identity based signature and its application [G] ffLNCS 3269: Proc of Information and Communications Security- ICICS'04. Berlin: Springer, 2004: 480-494.
  • 8Yuen T H, Wei V K. Constant-size hierarchical identitybased signature/signcryption without random oracles [R/OL]. ( 2005-06-03 ) [ 2011-04-07 ]. http://eprint, iacr. org/2005/412.
  • 9Man H A, Joseph K L, Tsz H Y, et al. Efficient hierarchical identity based signature in the standard model [R/OL]. (2007-11-02) [2011-04-07]. httpJ/eprint, iacr. org/2007/068.
  • 10Man H A, Joseph K L, Tsz H Y, et al. Practical hierarchical identity based encryption and signature schemes without random oracles [R/OL]. (2006-12-04) [2011-04- 07]. http://eprint, iacr. org/2006/368.

二级参考文献98

  • 1田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16
  • 2Au M H, Liu J K, and Yuen T H, et al, Efficient hierarchical identity based signature in the standard model. http://eprint .iacr .org/2006/080, 2007.5.
  • 3Zhang F, Safavi-Naini R, and Susilo W. An efficient signature scheme from bilinear pairings and its applications [C]. International Workshop on Practice and Theory in Public Key Cryptography, Singapore, March 1-4, 2004, LNCS 2947: 277-290.
  • 4Canetti R, Halevi S, and Katz J. Chosen-ciphertext security from identity-based encryption[C]. Advances in Cryptology- EUROCRYPT, Switzerland, May 2-6, 2004, LNCS 3027: 207-222.
  • 5Waters B. Efficient identity-based encryption without random oracles[C]. In: Advances in Cryptology-Eurocrypt 2005, Aarhus, Denmark, May 22-26, 2005, LNCS 3494: 114-127.
  • 6Paterson K G and Schuldt J C N. Efficient identity-based signatures secure in the standard Model[C]. Australasian Conference on Information Security and Privacy, Melbourne, Australia, July 3-5, 2006, LNCS 4058: 207-222.
  • 7Shamir A. Identity-based cryptosystems and signature schemes [C]. Advances in Cryptology-Crypto, California, USA, 1984, LNCS 196: 47-53.
  • 8Boneh D and Franklin M. Identity based encryption from the weil pairing [C]. Advances in Cryptology-CRYPTO, California, USA, August 19-23, 2001, LNCS 2139: 213-229.
  • 9Gentry C and Silverberg A. Hierarchical ID-based cryptography [C]. Advances in Cryptology-ASIACRYPT~ New Zealand, December 1-5, 2002, LNCS 2501: 548-566.
  • 10Horwitz J and Lynn B. Towards hierarchical identity-based encryption[C]. Advances in Cryptology-EUROCRYPT, The Netherlands, April 28 - May 2, 2002, LNCS 2332: 466-481.

共引文献29

同被引文献39

  • 1李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 2Shamir A. Identity-based cryptosystems and signature schemes [C] // Proceedings of CRYPTO 1984, volume 196 of LNCS. 1984:47-53.
  • 3Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Proceedings of CRYPTO 2001, volume 2139 of LNCS. 2001 : 213-229.
  • 4Waters B. Efficient identity-based encryption without random oracles[C]//Advances in Cryptology-EUROCRYPT 2005, vol- ume 3494 of LNCS. Springer-Verlag, 2005,114-127.
  • 5Gentry C. Practical identity-based encryption without random oracles[C]//Advances in Cryptology-EUROCRYPT 2006, vo- lume 4404 of LNCS. Springer-Verlag, 2006 : 445-464.
  • 6Hess F. Efficient identity based signature schemes based on pairings[C]//Proceedings of SAC 2002 ,volume 2595 of LNCS. Springer-Verlag, 2002 : 310-324.
  • 7Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in the standard model[C]//Proceedings of ACISP 2006, volume 4058 of LNCS. Springer-Verlag, 2006 : 207-222.
  • 8Horwitz J, Lynn/3. Toward hierarchical identity-based encryp- tion[C] // Proceedings of EUROCRYPT 2002, volume 2332 of LNCS. Springer-Verlag, 2002 : 466-481.
  • 9Gentry C, Silverberg A. Hierarchical id-based cryptography[C]// Proceedings of ASIACRYPT 2002, volume 2501 of LNCS. Springer-Verlag, 2002 : 548-566.
  • 10Boneh D, Canetti R, Halevi S, et al. Chosen-eiphertext security from identity-based encryption[J]. SIAM Journal on Compu- ting, 2006,36(5) : 915-942.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部