期刊文献+

可证安全的无证书代理环签名方案 被引量:3

Provably secure certificateless proxy ring signature scheme
下载PDF
导出
摘要 代理环签名可使代理者以匿名的方式进行代理签名,具有很多优点。首先给出无证书代理环签名方案的最强安全模型,并利用双线性映射提出一个高效的无证书代理环签名方案。在所定义的最强的安全模型下,方案给出了严格的安全证明,它的安全性基于计算Diffie-Hellman问题的困难性。分析显示该方案满足诸如无条件匿名性、强不可伪造性等安全性质。鉴于该方案的安全、高效和无证书管理的优点,它可广泛应用于电子政务、移动代理系统等方面。 Proxy ring signature, which enables a proxy signer to anonymously sign a message on behalf the original signer, has many advantages. This paper firstly proposed the strongest security model of certificateless proxy ring signature schemes and gave an efficient construction of certificateless proxy ring signature scheme using bilinear maps, with rigorous security proofs in the proposed strongest security model. The security of the scheme was based on the infeasibility of the computational Diffie- Hellman problem. The analysis shows that the new scheme satisfies the security requirements such as unconditional anonymity, strong unforgeability for a proxy ring signature scheme. Due to its security, efficiency and free of certificate management, it may have practical applications in electronic government affairs and mobile agent systems, etc.
出处 《计算机应用研究》 CSCD 北大核心 2013年第3期873-877,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(60673070) 安徽省自然科学基金资助项目(1208085MF108) 安徽省高校自然科学基金资助项目(KJ2012B157)
关键词 无证书密码系统 代理签名 环签名 代理环签名 certificateless cryptography proxy signature ring signature proxy ring signature
  • 相关文献

参考文献16

  • 1MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages [ J]. IEICE Trans on Fundamentals, 1996, E79-A(9) :1338-1353.
  • 2RIVEST R, SHAMIRE A, TAUMAN Y. How to leak a secret [ C ]// Proc of ASIACRYPT. Berlin : Springer,2001:552-565.
  • 3ZHANG Fang-gno, SAFAVI-NAINI R, LIN Chin-yin. Some new proxy signature schemes from pairings [ M ]//Progress on Cryptography: 25 Years of Cryptography in China. Shanghai:Shanghai Jiaotong Univer- sity Press ,2004:59-66.
  • 4LI Jin, CHEN Xiao-feng,TSZ H Y,et al. Proxy ring signature:formal definitions, efficient construction and new variant [ C ]//Proc of Inter- national Conferenceon Computational Inteuigenee and Security. 2007 : 545-555.
  • 5禹勇,杨波,李发根,张明武.一个有效的代理环签名方案[J].北京邮电大学学报,2007,30(3):23-26. 被引量:11
  • 6AMIT K, SUNDER L. ID-based ring signature and proxy ring signa- ture schemes from bilinear pairings [ J ]. Internal Journal of Network Security ,2007,4 ( 2 ) : 187-192.
  • 7张建中,薛荣红,彭丽慧.一种基于身份的代理环签名方案[J].计算机工程,2011,37(17):126-127. 被引量:5
  • 8AL-RIYAMI S, PATERSON K. Certificateless public key cryptogra- phy [ C ]//Proc of ASIACRYPT. Berlin: Springer-Verlag, 2003:452- 473.
  • 9陈虎,朱昌杰,宋如顺.高效的无证书签名和群签名方案[J].计算机研究与发展,2010,47(2):231-237. 被引量:17
  • 10HUANG Xin-yi, MU Yi, SUSILO W, et al. Certificateless signature re- visited [ C ]//Lecture Notes in Computer Science, vol 4586. 2007 : 308 - 322.

二级参考文献59

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2禹勇,杨波,李发根,张明武.一个有效的代理环签名方案[J].北京邮电大学学报,2007,30(3):23-26. 被引量:11
  • 3Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the power to sign messages. IEICE Trans. on Fundamentals, 1996, E79-A(9): 1338-1353.
  • 4Zhang k Threshold proxy signature schemes. In: Proc. of the 1997 Information Security Workshop. Japan, 1997. 191-197.
  • 5Yi LJ, Bai GQ, Xiao GZ. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 2000,36(6): 527-528.
  • 6Huang XY, Mu Y, Susilo W, Zhang FT. Short designated verifier proxy signature from pairings. In: Proc. of the SecUbiq 2005. LNCS3823, Nagasaki, Springer-Verlag, 2005. 835-844.
  • 7Zhang FG, Kim-K. Efficient 1D-based-blind signature and proxy signature from bilinear pairings. In: Safavi-Naini R, Seberry J, eds. Proc. of the ACISP 2003. LNCS 2727, Springer-Verlag, 2003. 312-323.
  • 8Al-Riyami S, Paterson K. Certificateless public key cryptography. In: Prec. of the Asiacrypt 2003. LNCS 2894, Springer-Verlag, 2003. 452-473.
  • 9Huang XY, Mu Y, Susilo W, Wong DS, Wu W. Certificateless signature revisited. In: Proc. of the Acisp 2007. LNCS 4586, Springer-Verlag, 2007. 308-322.
  • 10Zhang ZF, Wong DS, Xu J, Feng DG. Certificateless public-key signature: Security model and efficient construction. In: Zhou J, Yung M, Bao F, eds. Proc. of the ACNS 2006. LNCS 3989, Springer-Verlag, 2006. 293-308.

共引文献53

同被引文献20

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部