期刊文献+

一种有效的分级的基于身份签名方案

Efficient Hierarchical Identity-based Signature Scheme
下载PDF
导出
摘要 利用双线性对技术,依据Boneh等人提出的分级的基于身份加密方案,设计了一个在标准模型下分级的基于身份的签名方案。方案中签名的大小是一个常量,且与签名者所在的层数无关。最后,对方案的安全性进行了分析,证明方案在Diffie-Hellman Inversion(DHI)困难问题的假设下满足选择消息和选择身份攻击下的存在不可伪造性。 By using bilinear pairings technique,this paper presented a hierarchical identity based signature scheme in the standard model according to hierarchical identity based encryption scheme proposed by Boneh et al.The size of signature in the scheme is a constant and regardless of hierarchy depth of the signer.In the last,we proved the scheme is existential unforgeable against selective identity,selective chosen message attack in terms of the hardness of DHI problem.
出处 《计算机科学》 CSCD 北大核心 2012年第8期67-69,110,共4页 Computer Science
基金 国家自然科学基金项目(61170244) 河南省科技攻关计划项目(112102210370) 河南省教育厅自然科学基础研究计划项目(12A520002)资助
关键词 分级的基于身份的签名 双线性对 DHI问题 Hierarchical identity based signature Bilinear pairing Diffie-hellman inversion problem
  • 相关文献

参考文献17

  • 1Shamir A. Identity-based cryptosystems and signature schemes [C] // Proceedings of CRYPTO 1984, volume 196 of LNCS. 1984:47-53.
  • 2Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Proceedings of CRYPTO 2001, volume 2139 of LNCS. 2001 : 213-229.
  • 3Waters B. Efficient identity-based encryption without random oracles[C]//Advances in Cryptology-EUROCRYPT 2005, vol- ume 3494 of LNCS. Springer-Verlag, 2005,114-127.
  • 4Gentry C. Practical identity-based encryption without random oracles[C]//Advances in Cryptology-EUROCRYPT 2006, vo- lume 4404 of LNCS. Springer-Verlag, 2006 : 445-464.
  • 5Hess F. Efficient identity based signature schemes based on pairings[C]//Proceedings of SAC 2002 ,volume 2595 of LNCS. Springer-Verlag, 2002 : 310-324.
  • 6Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in the standard model[C]//Proceedings of ACISP 2006, volume 4058 of LNCS. Springer-Verlag, 2006 : 207-222.
  • 7Horwitz J, Lynn/3. Toward hierarchical identity-based encryp- tion[C] // Proceedings of EUROCRYPT 2002, volume 2332 of LNCS. Springer-Verlag, 2002 : 466-481.
  • 8Gentry C, Silverberg A. Hierarchical id-based cryptography[C]// Proceedings of ASIACRYPT 2002, volume 2501 of LNCS. Springer-Verlag, 2002 : 548-566.
  • 9Boneh D, Canetti R, Halevi S, et al. Chosen-eiphertext security from identity-based encryption[J]. SIAM Journal on Compu- ting, 2006,36(5) : 915-942.
  • 10Boneh D, Boyen X, C-oh E. Hierarchical identity based encryp- tion with constant size ciphertext[C]//Proceedings of EURO- CRYPT 2005, volume 3494 of LNCS. Springer-Verlag, 2005: 440-456.

二级参考文献28

  • 1李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 2Shamir A. Identity-based cryptosystems and signature schemes[C] //LNCS 196.. Proc of the Advances in Cryptography-Crypto'84. Berlin: Springer, 1984:47-53.
  • 3Waters B. Efficient identity-based encryption without random oracles [G] //LNCS 3494 Cryptography--Eurocrypt'05 127 Proc of the Advances in Berlin: Springer, 2005: 114-127.
  • 4Paterson K G, Schuldt J C. Efficient identity-based signatures secure in the standard model [G] //LNCS 4058: Proe of Information Security and Privacy-ACISP'06. Berlin: Springer, 2006:207-222.
  • 5Gentry C, Silverberg A. Hierarchical ID-based cryptography [G] //LNCS 2501: Proc of the Advances in Cryptography- Asiacrypt'02. Berlin: Springer, 2002:548-566.
  • 6Boneh D, Boyen X. Efficient seleetive-ID secure identity based encryption without random oracles [G] //LNCS 3027: Proc of the Advances in Cryptography-Eurocrypt'04. Berlin: Springer, 2004:223-238.
  • 7Chow S M, Hiu C K, Yiu S M, et al. Secure hierarchical identity based signature and its application [G] ffLNCS 3269: Proc of Information and Communications Security- ICICS'04. Berlin: Springer, 2004: 480-494.
  • 8Yuen T H, Wei V K. Constant-size hierarchical identitybased signature/signcryption without random oracles [R/OL]. ( 2005-06-03 ) [ 2011-04-07 ]. http://eprint, iacr. org/2005/412.
  • 9Man H A, Joseph K L, Tsz H Y, et al. Efficient hierarchical identity based signature in the standard model [R/OL]. (2007-11-02) [2011-04-07]. httpJ/eprint, iacr. org/2007/068.
  • 10Man H A, Joseph K L, Tsz H Y, et al. Practical hierarchical identity based encryption and signature schemes without random oracles [R/OL]. (2006-12-04) [2011-04- 07]. http://eprint, iacr. org/2006/368.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部