期刊文献+

一种高效的无证书多重签名方案 被引量:3

Efficient certificateless multi-signature scheme
下载PDF
导出
摘要 为了满足多个人对同一份文件签名的高效性,将无证书密码体制与多重签名方案相结合,提出一种高效的无证书多重签名方案。该方案有效地削弱了可信第三方的权力,并且被证明了在适应性选择消息攻击下是存在性不可伪造的,其安全性基于CDH问题的困难假设。与现有方案相比,该方案需要计算的双线性对计算次数少,降低了系统开销。 In order to meet the high efficiency of the multi-signature,by combining certificateless cryptosystem with the multi-signature scheme,this paper proposed an efficient certificateless multi-signature scheme.The scheme was weaken the power of the trusted third party and proved existing unforgeability under the adaptive chosen message attack.The security of the scheme was based on the fact that computational Diffie-Hellman problem was hard.Compared with existing schemes,the scheme need calculate less bilinear pairing and reduce the system costs.
出处 《计算机应用研究》 CSCD 北大核心 2012年第2期644-645,649,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60963023) 贵州省自然科学基金资助项目(2009-2113) 贵州省高层次人才特助经费项目(TZJF-2008-33) 贵州大学研究生创新基金资助项目(校研理工2011037)
关键词 无证书密码学 多重签名 不可伪造性 双线性对 certificateless cryptography multi-signatures unforgeability bilinear pairing
  • 相关文献

参考文献8

  • 1A1-RIYAMI S S, PATERSON K G. Certificateless public key cryptog- raphy [ C ]//Lecture' Notes in Computer Science, vol 2894. Berlin : Springer, 2003:452 - 473.
  • 2ITAKURA K, NAKAMUPA K. A public key cryptosystem suitable for digital muhisignatures [J]. NEC Research & Develepment,1983, 71:1-8.
  • 3MICALI S, OHTA K, REYZIN L. Accountable sub group multisigna- tures[ C]//Proc of the 8th ACM Conference on Computer and Com- munications Security. New York : ACM ,2001:245-254.
  • 4BOLDYREVA A. Threshold signature, muhisig nature and blind sig- nature sehemes based on the gap Diffie-HeBman-group signature scheme[ C ]//Leeture Notes in Computer Seienee, vol 2567. Berlin: Springer,2003:31-46.
  • 5BONEH D, LYNN B, SHACHAM H. Short signatures from the Weil pairing [ J ]. Journal of Cryptology ,2004,17 (4) :297- 319.
  • 6梁红梅,黄慧,吴晨煌,黄振杰.无证书多重签名[J].集美大学学报(自然科学版),2008,13(2):127-131. 被引量:10
  • 7丁薇,张建中.一种新的多重代理多重数字签名方案[J].计算机应用研究,2010,27(8):3081-3082. 被引量:4
  • 8张玉磊,王彩芬.高效的无证书并行多重签名方案[J].计算机应用,2010,30(A12):3337-3340. 被引量:2

二级参考文献26

  • 1徐秋亮,金永明,张波.Hwang-多重代理多重签名方案的改进[J].大连理工大学学报,2005,45(z1):100-102. 被引量:2
  • 2杨磊,周轶武,李益发.一个改进的多重代理多重签名方案[J].信息工程大学学报,2006,7(1):4-6. 被引量:2
  • 3吴问娣,曾吉文.一种无证书的环签名方案和一个基于身份的多重签名方案[J].数学研究,2006,39(2):155-163. 被引量:15
  • 4祁传达,王念平,金晨辉.一个新的多重代理多重签名方案[J].电子与信息学报,2006,28(8):1415-1417. 被引量:2
  • 5王勇兵,张建中.门限多代理多签名方案[J].计算机应用研究,2007,24(6):131-132. 被引量:7
  • 6MAMBO M,USIDA K,OKAMOTO E.Proxy signatures:delegation of the power to sign message[J].IEICE Trans Fundamentals,1996,E79-A(9):1338-1354.
  • 7AL-RIYAMI S, PATERSON K. Certificateless public key cryptography [ C ] //Cryptology-ASIACRYPT 2003. LNCS 2894. Berlin: Sprlnger-Vedag, 2003 : 452-473.
  • 8HUANG X, SUSILO W, MU Y, et al. On the security of certificateless signature schemes from Asiacrypt 2003 [ C] // 4th International Conference on Cryptology and Network Security, CANS 2005. LNCS 3810. Berlin: Springer-Verlag, 2005 : 13-25.
  • 9YUM D, LEE P. Generic construction of certificateless signature [ C ] //9th Australasian Conference on Information Security and Privacy, ACISP 2004. LNCS 3108. Berlin: Springer-Verlag, 2004: 200-211.
  • 10HU B, WONG D, ZHANG Z, et al. Key replacement attack against a generic construction of certificateless signature^* [C] //11th Australasian Conference on Information Security and Privacy, ACISP 2006. LNCS 4058. Berlin: Springer- Verlag, 2006: 235-246.

共引文献13

同被引文献25

  • 1王标,方颖珏,林宏刚,李轶.基于环Z_n上圆锥曲线的QV签名方案[J].中国科学(F辑:信息科学),2009,39(2):212-217. 被引量:3
  • 2孙琦,朱文余,王标.环Z_n上圆锥曲线和公钥密码协议[J].四川大学学报(自然科学版),2005,42(3):471-478. 被引量:44
  • 3肖龙,王标,孙琦.基于环Z_n上的圆锥曲线数字签名和多重数字签名[J].西安交通大学学报,2006,40(6):648-650. 被引量:14
  • 4AL-RIYAMI S, PATERSON K. Certificateless public key cryptography [ C ]//LNCS, vol 2894. Berlin : Springer-Verlag ,2003:452- 473.
  • 5ZHANG Lei, ZHANG Fu-tai, WU Wei. A provably secure ring signature scheme in certificateless cryptography [ C ]//LNCS, vol 4784. Berlin : Springer-Verlag,2007 : 103-121.
  • 6POINTCHEVAL D,STERN J. Security arguments for digital signatures and blind signatures [J]. ,Journal of Cryptolo0y,2000,33(3):361-396.
  • 7DAI Zongduo, PEI Dingyi, YANG Junhui, et al. Cryptanalysis of a public key eryptosystem based on conic curves[C]// The International Workshop on Cryptographic Techniques &E-Commerce, Hong Kong,2000.
  • 8ITAKURA K,NAKAMUPA K. A public key cryptosystem suitable for digital multisignatures[J]. NEC Research & Develepment, 1983,71 : 1-8.
  • 9WIENER M J. Cryptanalysis of short RSA secret exponents[J]. IEEE Trans Inf Theory, 1990,36(3) :553-558.
  • 10陈虎,张福泰,宋如顺.可证安全的无证书代理签名方案(英文)[J].软件学报,2009,20(3):692-701. 被引量:21

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部