期刊文献+

强指定验证者的无证书变色龙数字签名方案

Certificateless chameleon digital signature scheme for strong designated verifier
原文传递
导出
摘要 基于无证书密码体制,构造了一个无证书变色龙哈希函数,解决了基于身份的变色龙哈希存在的密钥托管问题,使除了指定验证者之外的其他任何人都无法计算出变色龙哈希碰撞。在此基础上,进一步实现了无证书变色龙签名。在签名验证过程中,保证只有签名者指定的验证者才能验证签名的有效性。新方案简单高效,在随机预言模型下是安全的。 A certificateless chameleon hash function was constructed based on the certificateless cryptography. It resolves the key escrow problem in identity-based chameleon hashing perfectly. No one except the specified verifier can find a collision of our proposed chameleon hash function. Moreover, a certificateless chameleon signature was given in this paper. The designated verifier only can verify the validity of signature in the verification process of our scheme. The new scheme is simple and efficient, which is secure in the random oracle model.
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2012年第9期15-18,共4页 Journal of Shandong University(Natural Science)
基金 陕西省教育厅资助项目(2010JK825) 西安邮电学院青年教师科研基金项目(ZL2010-04)
关键词 无证书密码体制 变色龙数字签名 指定验证者 certificateless cryptography chameleon digital signature designated verifier
  • 相关文献

参考文献6

  • 1KRAWCZYK H RABIN T. Chameleon signatures[ C ]// Proceedings of Network and Distributed System Security Symposium ( NDSS 2000). San Diego : Internet Society,2000: 143-154.
  • 2SHAMIR A. Identity-based cryptosystems and signature schemes [ C ] // Proceedings of CRYPTO 84 on Advances in cryptology. New York: Springer-Verlag New York, Inc. 1985: 47-53.
  • 3AL-RIYAMI S, PATERSON K. Certificateless public key cryptography [ J ]. Lecture Notes in Computer Sci- ence, 2003, 2894:452-473.
  • 4詹阳,田海博,陈晓峰,王育民.基于身份的无密钥托管的变色龙hash函数和签名[J].北京工业大学学报,2010,36(5):685-688. 被引量:2
  • 5PATERSON K G. ID-based signatures from Pairings on Elliptic Curves[ J]. Electronics Letters, 2002, 38 (18) : 1025 -1026.
  • 6JAKOBSSON M, SAKO K, IMPAGLIAZZO R. Desig- nated verifier proofs and their applications [ J ]. Lecture Notes in Computer Science, 1996, 1070:143-154.

二级参考文献10

  • 1Chen Xiaofeng,Zhang Fangguo,Kwangjo Kim.NEW ID-BASED GROUP SIGNATURE FROM PAIRINGS[J].Journal of Electronics(China),2006,23(6):892-900. 被引量:8
  • 2KRAWCZYK H ,RABIN T. Chameleon signatures[ C]/// Proceedings of Network and Distributed System Security Symposium (NDSS 2000). San Diego: Internet Society, 2000: 143-154.
  • 3SHAMIR A. Identity-based cryptosystems and signature schemes [ C] // Advances in Cryptology (Crypto'84). California: Springer-Verlag, 1984: 47-53.
  • 4BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[ C ]// Advances in Cryptology( Crypto'01 ). Santa Barbara:Springer-Verlag, 2001: 213-229.
  • 5CHOW S. Removing escrow from identity-based encryption[ C ]// The 12th International Conference on Practice and Theory in Public-Key Cryptography( PKC'09). Irvine: Springer-Verlag, 2009 : 256-276.
  • 6YUEN T, SUSILO W ,MU Yi. How to Construct identity-based signatures without the key escrow problem[ EB/OL]. [2010- 03-01 ]. http :///eprint. iacr. org/2009/421.
  • 7ATENIESE G, MEDEIROS B. Identity-based chameleon hash and applications [ C ] // Financial Cryptography and data security ( FC '04). Key West : Springer-Verlag, 2004 : 164-180.
  • 8ATENIESE G, MEDEIROS B. On the key-exposure problem in chameleon hashes [ C] //The Fourth Conference on Security in Communication Networks (SCN '04). Amalfi: Springer-Verlag, 2004 : 165-179.
  • 9CHEN Xiao-feng, ZHANG Fang-guo, KIM K. Chameleon hashing without key exposure [ C] // Information Security, 7th International Conference (ISC'04). Palo Alto: Springer-Verlag, 2004- 87-98.
  • 10ZHANG Fang-guo, SAFAVI-NAINI R, SUSILO W. ID-based chameleon hashes from bilinear pairings[ EB/OL]. [2010-03- 01]. http://eprint, iacr. org/2003/208.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部