期刊文献+

改进的代理环签名方案 被引量:3

Improved proxy ring signature scheme
下载PDF
导出
摘要 对Luo提出的代理环签名方案分析发现该方案不具备不可伪造性,攻击者无须原始签名人的代理授权能够伪造出一个有效的代理环签名。为了防止这种伪造攻击,基于双线性对和GDH群,通过修正代理环签名的签名算法和相应的验证等式提出一个改进方案。安全分析表明改进方案克服了原方案的安全缺陷,满足代理环签名的所有安全要求,而且改进方案保持了原方案计算效率高的优点。 By analyzing the proxy ring signature scheme proposed by Luo,it was found that the scheme did not possess unforgeability,because an accacker without the proxy authorzation of original signer could forge a valid proxy ring signarue.To prevent this forgery attack,by changing signataure algorithm and the corresponding verification equation of proxy ring signarue,this paper proposed an improved scheme based on bilinear pairings and gap Diffie-Hellman group.The security analysis proves that the imporved scheme overcomes the security defect of original scheme and satisfies all security requirements of proxy ring signarue.Furthermore,it retains the merit of high computing efficiency in the original scheme.
作者 张小萍 钟诚
出处 《计算机应用研究》 CSCD 北大核心 2011年第9期3505-3507,共3页 Application Research of Computers
基金 广西教育厅资助项目(200708LX359) 广西高校人才小高地建设创新团队计划资助项目(桂教人[2007]71号)
关键词 代理签名 代理环签名 双线性对 不可伪造性 匿名性 proxy signature proxy ring signature bilinear pairings unforgeability anonymity
  • 相关文献

参考文献9

二级参考文献47

共引文献18

同被引文献35

  • 1禹勇,杨波,李发根,张明武.一个有效的代理环签名方案[J].北京邮电大学学报,2007,30(3):23-26. 被引量:11
  • 2Boneh D, Boyen X. Secure identity-based encryption without random oracles[ C]//Proc. of the Advances in Cryptology- CRYPTO. Berlin: Springer-Verlag ,2004:443 -459.
  • 3Waters B. Efficient identity-based encryption without random oracles[ C ]//Advances in Cryptology- EUROCRYPT 2005. Berlin : Springer-Verlag ,2005 : 114-127.
  • 4Paterson K G, Schuldt J C N, Efficient identity-based signa- tures secure in the standard model[ C ]//Proc. of the ACISP 2006. Berlin : Spfinger-Verlag ,2006:207-222.
  • 5AI-Riyami S S,Paterson K G. Certificateless public key cryp- tography [ C ]//Proc. of the AS1ACRYPT 2003. Berlin: Springer-Verlag,2003:452-473.
  • 6Shamir A. Identity-based cryptosystems and signature sche- mes [ C ]//Proceedings of Crypto 1984. Berlin : Springer Ver- lag, 1985:47-53.
  • 7Hu B, Wong D, Zhang F, et al. Key replacement attack against a generic construction of certificate|ess signature [ C ]//Ad- vances in ACISP 2006, Lecture Notes in Computer Science. Berlin : Springer-Verlag ,2006:235 -246.
  • 8Yap W, Heng S, Goi B. An efficient certificateless signature scheme [ C ]//Proc. of EUC Workshop 2006, Lecture Notes in Computer Science. Berlin : [ s. n. ] ,2006 : 322-331.
  • 9Rivest R L,Shamir A,Tauman Y. How to Leak a Secret 17th International Conference on the Theory and Application of Cryptology and Information Security[ C]//LNCS 2248. Ber- lin : Springer- Verlag ,2001:552-565.
  • 10Mambo M, Usuda K, Okamoto E. Proxy Signatures : Delegationof the Power to Sign Messages [ J ]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1996,79 ( 9 ) : 1338-1354.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部