期刊文献+

一个无证书的环代理签名方案 被引量:3

Certificateless Ring Proxy Signature Scheme
下载PDF
导出
摘要 无证书公钥密码体制既简化了传统公钥密码体制负担过重的密钥管理问题,又消除了基于身份的公钥密码体制所固有的密钥托管缺陷.基于无证书公钥密码体制提出一个高效的环代理签名方案,其成员私钥不再由密钥生成中心KGC单独产生,而由KGC和用户合作生成.安全性和有效性分析比较,该方案既具有环签名的无条件匿名性,原始签名人能匿名授权代理权限,又满足强代理签名的所有安全特性,能够有效抵制KGC的强伪造攻击;其环代理授权过程,不需要双线性对运算且标量乘运算代价较现有最优方案减少了一半,其效率具有明显优势,适用于需要匿名性且带宽受限的场合. Certificateless public key cryptography reduces the difficult problem of key management in traditional public key cryptogra- phy,it also eliminates the key-escrow problem of identity-based cryptography and also preserves all of its advantages. A the lowest calculating time ring proxy signature scheme is proposed, the secret keys of singers in the scheme is generated by members and secret key generation center( KGC) cooperatively. In contrast with other similar scheme in security and efficiency, our scheme can meet with the requirements of unconditional anonymity of the original signer's proxy delegation, and can resist the strongest forgery attacks from the KGC, and achieves all security attributes of strong proxy signature. Especially,it is more efficient in ring proxy delegation phase because without the computational cost of bilinear pairings, and the computational cost of scalar multiplication required is half of other scheme, so it is suitable to the application of low bandwidth and anonymity.
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第4期764-767,共4页 Journal of Chinese Computer Systems
基金 湖北省教育厅科研项目(B20101706)资助 湖北省自然科学基金项目(2009Chb008)资助
关键词 无证书公钥体制 环签名 代理签名 安全性分析 certificateless public key cryptography ring-signature proxy-signature security analysis
  • 相关文献

参考文献3

二级参考文献21

  • 1Herrenz J, Sdez G. Aprovably secure ID-based ring signature scheme. Cryptology aprint Archive, Report. 2003, 261.
  • 2The pairing-based Crypto Lounge Web maintained by Paulo Barreto: http://planeta.terra.com. br/informatical/paulobarreto/pblounge.htm.
  • 3Hess F. Efficient identity based signature schemes based on parings, SAC 2002 LNCS 2595, SPringer-Verlag, 2002, 310-324.
  • 4Shamir A. Identity-based eryptosystems and signature schemes, Crptyo LNCS, 1984, 196:47- 53.
  • 5Al-Piyami S S, Peterson K G.Gertificateless public key cryptography. Asiacrypt LNCS 3-43, Springer-Verlag, 2003, 452-474.
  • 6Schnorr C P. Efficient signature generation by smart cards. Journal of Cryptology, 1991, 4:161-174.
  • 7Rivest R, Shamir A, Tauman Y. How to leak a secret, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, Springer-Verlag, 2001, 552-565.
  • 8Bresson E, Stem J, Szydlo M. Threshold Ring Signatures for Ad-hoc Groups. Advences in cryptology-Crypt 2002, LNCS 2442, Springer-Verlag, 2002, 465-480.
  • 9Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures form a variety of keys. Adences in cryptology-Asiacrypt 2002, LNCS 2501, Springer-Verlag, 2002, 415-432.
  • 10Herrenz J, Saez G. Forking lemmas for ring signature schemes. Proceedings of Indocrypt 2003 LNCS 2904, Springer-Verlag, 2003, 266-279.

共引文献15

同被引文献28

  • 1王守伟,丁勇.一个无证书的代理环签名方案[J].保密科学技术,2012(4):62-65. 被引量:3
  • 2Shamir A. ID-based cryptosystems and signature schemes[C]// Proc. CRYPTO'84. Berlin: Springer-Verlag, 1984 : 47-53.
  • 3Mambo M, Usuda K, Okamoto E, Proxy signatures for delegating signing operation[C]//Proc. 3rd ACM Conference on Computer and Communications Security. New York ACM Press,1996:48-57.
  • 4Rivest, Shamir A, Tauman Y. How to leak a secret[C]//Lecture Notes in Computer Science. Berlin.- Springer Verlag,2001:552-565.
  • 5Bresson E, Sten J, Szydlo M. Threshold ring Signature and applications to ad-hoe groups[C] //Proc. CRYPTO'02. Berlin, Heidelberg, New York : Springer-Verlag, 2002 : 465-480.
  • 6Amit K, Sunder L. ID-based ring signature and proxy ring signature schemes from bilinear pairings[J]. Internal Journal of Network Se curity,2007,4(2) :187 192.
  • 7黄奕芝,王常吉.一种新的代理门限环签名方案[c]//中国电子学会第十五届信息论学术年会暨第一届全国网络编码学术年会论文集:上册.北京:国防工业出版社,2008:357-360.
  • 8Saez G, Herranz J. Forking lemmas for ring signature scheme[C]//INDOCRYPT 2003, LNCS 2947. Berlin, Heidelberg= Springer- Verlag, 2003 : 266-279.
  • 9石红岩.一种无证书的代理环签名方案[J].计算机安全,2009(11):47-49. 被引量:3
  • 10王会歌,沈峰,赵靖,曹浩.不使用双线性对的无证书代理环签名方案[J].安徽科技学院学报,2011,25(4):45-48. 被引量:4

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部