期刊文献+

一种无证书的在线/离线盲签名方案

ACertificateless On-line/Off-line Blind Signature Scheme
下载PDF
导出
摘要 无线通信终端处理能力和响应速度能力有限,普通的数字签名方案无法适用。为此,结合优化的在线/离线签名,构造一种无证书的在线/离线盲签名方案。在签名过程中,大部分运算在盲消息给出之前进行,在给出盲消息之后,再进行少量运算得出签名,签名人并不知道所签文件内容。性能分析结果表明,该方案可以应用在无线网络上,用于保护用户隐私。 The processing ability and response speed of the wireless communication terminals are limited, common signatures become the bottleneck to the development of the wireless networks. For that problem, the certificateless on-line/off-line blind signature is given in this paper which incorporates with the optimal on-line/off-line signature. Most computations are finished before the blind message is given, after that, only a few operations are needed. Results of performance analysis show tha~ tbc signature scheme can be applied to the wireless network, and it can protect the users' privacy efficiently.
作者 蒋华 胡冉东
出处 《计算机工程》 CAS CSCD 2012年第16期127-129,共3页 Computer Engineering
关键词 数字签名 双线性映射 在线/离线签名 盲签名 无线网络 digital signature bilinear mapping on-line/off-line signature blind signature wireless network
  • 相关文献

参考文献10

  • 1Shamir A, Tauman Y. Improved Online/Offiine Signature Sche- mes[C]//Proc, of CRYPTO'84. Santa Barbara, California, USA: [s. n.], 1984.
  • 2胡亮,刘哲理,孙涛,刘芳.基于身份密码学的安全性研究综述[J].计算机研究与发展,2009,46(9):1537-1548. 被引量:18
  • 3Chen Xiaofeng, Zhang Fangguo, Susilo W, et al. Efficient Generic On-line~Off-line Signatures Without Key Exposure[C]//Proc. of ACNS'07. Zhuhai, China: [s. n.], 2007.
  • 4Harm L, Hsin W J, Lin Changlu. Efficient On-line/Off-line Sig- nature Schemes Based on Multiple-collision Trapdoor Hash Families[J]. Journal of Systems and Software, 2009, 82(5): 789-793.
  • 5Gao Chongzhi, Yao zhengan. A Further Improved On-line/Off-line Signature Schemes[C]//Proc. of CRYPTO'09. Santa Barbara, USA: [s. n.], 2009.
  • 6Girault M, Poupard G, Stem J. On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order[J]. Joumal of Cryptology, 2006, 19(4): 463-487.
  • 7Chevallier-Mames B, Joye M. A Pratical and Tightly Secure Signature Scheme Without Hash Function[C]//Proc. of CT-RSA'07. San Francisco, USA: [s. n.], 2007.
  • 8Joye M. An Efficient On-line/Off-line Signature Scheme Without Random Oracles[C]//Proc. of CANS'08. Hong Kong, China: [s. n.], 2008.
  • 9Guo Fuchun, Mu Yi. Optimal Online/Offiine Signature: How to Sign Message Without Online Computation[C]//Proc. of the 2nd International Conference on Provable Security. Berlin, Germany: Springer-Verlag, 2008.
  • 10Waters B. Efficient Identity-based Encryption Without Random Oracles[C]//Proc. of EUROCRYPT'05. Berlin, Germany: Springer- Verlag, 2005.

二级参考文献74

  • 1田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16
  • 2Diffie W, Hellman M E. New directrions in cryptography [J]. IEEE Trans on Information Theory, 1976, 22(6) : 644- 654.
  • 3Rivest R L, Shamir A, Adelman L. A method for obtaining digital signatures and public key cryptosystem [J]. Communications of ACM, 1987, 21(2):120-126.
  • 4ElCamal T. A public key cryptosystem and a signature scheme based on discrete logarithms [J]. IEEE Trans on Information Theory. 1985, 31(4): 469-472.
  • 5Miller V. Use of elliptic curves in cryptography [G] //LNCS 216: Proc of the Advances in Cryptology--Crypto'85. Berlin: Springer, 1985:417-426.
  • 6Koblitz N. Elliptic curve cryptosystems [J]. Mathematics of Computation. 1987, 48(177): 203-209.
  • 7Goldwasser S, Mieali S. Probabilistie encryption[J]. Journal of Computer and System Sciences, 1984, 28 (2) : 270-299.
  • 8Micali S, Rackoff C, Sloan R. The notion of security for probabitistic cryptosystems [J]. SlAM Journal on Computing, 1988, 17(2) : 412-426.
  • 9Dolev D, Dwork C, Naor M. Non-malleable cryptography [J]//Proc of the 23rd Annual Syrup on Theory of Computing (STOC'91). New York: ACM, 1991:542-552.
  • 10Dolev D, Dwork C, Naor M. Non-malleable cryptography: CS95 27 [R/OL]. [ 2008-07-10 ]. http://www, stat. washington, edu/tech, reports/.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部