期刊文献+

标准模型下高效的代理签名方案

Efficient Proxy Signature Scheme in Standard Model
下载PDF
导出
摘要 代理签名方案允许原始签名者将自己的签名权力授权给代理签名者,使得代理签名者能够代表原始签名者对消息进行签名。提出了一个新的标准模型下可证安全的代理签名方案,其安全性基于q-强Diffie-Hellman困难问题,证明了该方案在标准模型下能够抵抗适应性选择消息攻击下的存在性伪造。与已有的方案进行比较,提出的方案需要较少的公共参数,实现了紧凑的安全归约,并且在密钥生成、标准签名、授权生成、代理签名生成等阶段具有较高的效率。 A proxy signature allows original signer to delegate his signing capability to the proxy signer in such a way that the proxy signer can sign messages on behalf of the original signer. This paper proposes a new probably secure signature scheme in the standard model. The security of new scheme is based on the intractability of q-strong Diffie-Hellman problem. The scheme is proved secure against existential forgery in adaptively chosen message attack in the standard model. Compared with existing schemes, the proposed scheme which needs less public parameters with a tight security reduction has obvious advantages in generating secret key, standard signing, proxy signing and generating delegation, etc.
出处 《计算机科学与探索》 CSCD 2012年第3期248-256,共9页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金No.60821001 国家重点基础研究发展规划(973)No.2007CB311203 高等学校博士学科点专项科研基金No.20070013007~~
关键词 代理签名 标准模型 q-强Diffie-Hellman问题 proxy signature standard model q-strong Diffie-Hellman problem
  • 相关文献

参考文献15

  • 1Mambo M, Usuda K, Okamoto E. Proxy signature for delegating signing operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Se- curity (CCS 1996), New Delhi, India, Mar 14-16, 1996. New York, NY, USA: ACM, 1996: 48-57.
  • 2Zhang F, Safavi-Naini R, Susilo W. An efficient signature scheme from bilinear parings and its applications[C]// LNCS 2947: Proceedings of the 7th International Work- shop on Theory and Practice in Public Key Cryptography (PKC '04), Singapore, Mar 1-4, 2004. Berlin: Springer- Verlag, 2004: 277-290.
  • 3Okamoto T, Inomata A, Okamoto E. A proposal of short proxy signature using pairing[C]//Proceedings of the Inter- national Conference on Information Technology: Coding and Computing (ITCC '05), Las Vegas, Nevada, Apr 4-6, 2005. Washington, DC, USA: IEEE Computer Society, 2005:631-635.
  • 4Huang Xinyi, Mu Yi, Susilo W, et al. A short proxy sig- nature scheme: efficient authentication in the ubiquitous world[C]//LNCS 3823: Proceedings of the 2nd Interna- tional Symposium on Ubiquitous Intelligence and Smart Worlds (UISW 2005), Nagasaki, Japan, Dec 6-7, 2005. Berlin: Springer-Verlag, 2005: 480-489.
  • 5Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing[J]. Journal of Cryptology, 2004, 17(4): 297- 319.
  • 6Boneh D, Gentry C, Lynn B, et al. Aggregrate and veri- fiably encrypted signatures from bilinear maps[C]//LNCS 2656: Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT 2003), Warsaw, Poland, May 4-8, 2003. Berlin: Springer-Verlag, 2003: 416-432.
  • 7Lu Rongxing. Study and design of several proxy crypto- graphic schemes[D]. Shanghai: Shanghai Jiao Tong Uni- versity, 2006: 33-62.
  • 8Pointcheval D, Stern J. Security arguments for digital sig- natures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-369.
  • 9Canetti R, Goldreich O, Halevi S. The random Oracle methodology, revisited[C]//Proceedings of the 30th Annual ACM Symposium on Theory of Computing (STOC '98), Dallas, TX, USA, May 24-26, 1998. New York, NY, USA: ACM, 1998: 209-218.
  • 10Waters B. Efficient identity-based encryption without random Oracles[C]//LNCS 3494: Proceedings of the 24th International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT 2005), Aarhus, Denmark, May 22-26, 2005. Berlin: Springer-Verlag, 2005: 114-127.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部