期刊文献+

基于证书的签名方案 被引量:6

Efficient Certificate-Based Signature Scheme
原文传递
导出
摘要 在离散对数问题的困难性假设下,提出了基于证书签名方案,并在最强的安全模型下证明了该方案的安全性.该方案只使用普通的Hash函数,其签名算法和验证算法都不需要复杂的双线性对运算,计算效率高,适用于无线传感器网络等能量受限的系统. A new certificate-based signature scheme is proposed.Assuming the intractability of discrete logarithm problem,the scheme proves to be secure in the strongest security model of certificate-based signature schemes.It requires general cryptographic Hash functions;with no need of any heavily cost bilinear pairing operations in its signing and verifying algorithms.So,it is of advantage of high computation efficiency,and can be used in some power-constrained devices,such as wireless sensor networks.
作者 杨波 肖自碧
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2012年第5期73-76,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60973159) 高等学校学科创新引智计划项目(B08004) 湖北省教育厅科学技术研究项目(Q20111113) 冶金工业过程系统科学湖北省重点实验室开放基金项目(Y201118)
关键词 离散对数问题 基于证书签名 安全模型 双线性对 discrete logarithm problem certificate-based signature security model bilinear pairing
  • 相关文献

参考文献10

  • 1Gentry C. Certificate-based encryption and the certificaterevocation problem[ C]//Proc of Eurocrypt,03. Berlin:Springer-Verlag, 2003 : 272-293.
  • 2Girault M. Self-certified public keys [ C ]//Poc ofEurocrypt,91. Berlin: Springer-Verlag, 1991 : 490-497.
  • 3Kang B G, Park J H, Hahn S G. A certificate-basedsignature scheme [ C ] //Proc of CT-RSA 2004. Berlin :Springer-Verlag, 2004 : 99-111.
  • 4Li J, Huang X,Mu Y,et al. Certificate-basedsignature : security model and efficient construction[C ]//EuroPKI,07. Berlin: Springer-V erlag, 2007;110-125.
  • 5Wu W, Mu Y,Susilo W, et al. Certificate-basedsignatures revisited [J]. Journal of Universal ComputerScience, 2009,15(8) : 1659-1684.
  • 6Liu J K, Baek J, Susilo, et al. Certificate-basedsignature scheme without pairings or random oracles[C]//ISC,08. Berlin: Springer-Verlag, 2008 : 285-297.
  • 7Zhang J. On the security of a certificate-based signaturescheme and its improvement with pairings [ C]//Proc ofISPEC,09. Berlin: Springer-Verlag, 2009 : 47-58.
  • 8Galindo D, Garcis F D. A schnorr-like lightweightidentity-based signature scheme [ C ]//Proc ofAfricacrypt ’09. Berlin; Springer-Verlag, 2009 : 135-148.
  • 9Boldyreva A, Palacio A, Warinschi B. Secure proxysignature schemes for delegation of signing rights [ EB/OL ]. Cryptology ePrint Archive,Report 2003/096(2003),http://eprint. iacr. org/.
  • 10Bellare M,Neven G. Multi-signatures in the plainpublic-key model and a general forking lemma [ C ]//Proc of CCS '06. Alexandria: ACM , 2006 : 390-399.

同被引文献46

  • 1GENTRY C.Certificate-based Encryption and the Certificate Revocation Problem[C]// Proceedings of the Eurocrypt'03.Berlin:Springer-Verlag,2003:272-293.
  • 2李继国.基于证书公钥密码体制研究现状[J].中国密码学会通讯,2010(1):10-14.
  • 3KANG B G,PARK J H,HAHN S G.A Certificate-based Signature Scheme[C]//Proceedings of the Cryptographer's Track at RSA Conference(CT-RSA/04).Berlin:SpringerVerlag,2004:99-111.
  • 4LI J G,HUANG X Y,MU Y,et al.Certificate-based Signature:Security Model and Efficient Construction[C]//Proceedings of the European Workshop on Public Key Services,Applications and Infrastructures (PKI'07).Berlin:Springer-Verlag,2007:110-125.
  • 5LIU J K,BAEK J,SUSILO W,et al.Certificate-based Signature Scheme without Pairings and Random Oracles[C]//Proceedings of the Internt Software Consortium (ISC'08).Berlin:Springer-Verlag,2008:285-297.
  • 6ZHANG J H.On the Security of a Certificate-based Signature Scheme and its Improvement with Pairings[C]//Proceedings of International Conference on Information Security Practice and Experience (ISPEC/09).Berlin:SpringerVerlag,2009:47-58.
  • 7LI J G,XU L Z,ZHANG Y C.Provably Secure Certificate-based Proxy Signature Schemes[J].Journal of Computers,2009,4(6):444-452.
  • 8WU W,MU Y,SUSILO W.Certificate-based Signatures:New Definitions and a Generic Construction from Certificateless Signatures[C]//Proceedings of the Web Information System and Application (WISA/08).Berlin:Springer-Verlag,2009:99-114.
  • 9LI J G,HUANG X Y,ZHANG Y C,et al.An Efficient Short Certificate-based Signature Scheme[J].Journal of Systems and Software,2012,85(2):314-322.
  • 10WU W,MU Y,SUSILO W,et al.A Provably Secure Construction of Certificate-based Encryption from Certificateless Encryption[J].The Computer Journal,2012,55(10):1157-1168.

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部