期刊文献+

标准模型下的高效无证书短签名方案 被引量:6

Efficient Certificateless Short Signature Scheme Under Standard Model
下载PDF
导出
摘要 大多数无证书签名方案需要多个双线性对运算,导致效率较低。为此,基于强Diffie-Hellman问题,提出一种新的无证书短签名方案,在签名的生成和验证过程中只需要1次双线性对运算和1次哈希函数操作,且签名长度与Boneh-Boyen的短签名长度相同。在标准模型下证明该方案对于2类敌手的攻击均具有不可伪造性。 Most certificateless signature schemes are inefficient because they need several bilinear parings operations. Aiming at the problem, this paper proposes a new certificateless short signature scheme based on Strong Diffie-Hellman(SDH) problem. It is more efficient because it needs only one bilinear parings operation and one hash operation in signing and verifying processes, and it has the same length as Boneh-Boyen's short signature. It is proved satisfying non-forgeability under two types of adversaries' attacks under standard model.
出处 《计算机工程》 CAS CSCD 2012年第13期119-121,共3页 Computer Engineering
基金 河南省自然科学基金资助项目(112300410192) 河南省教育厅科学技术研究基金资助重点项目(12B120009 2011A120006)
关键词 无证书密码学 标准模型 随机预言 强Diffie-Hellman问题 双线性对 不可伪造性 certificateless cryptography standard model random oracle Strong Diffie-Hellman(SDH) problem bilinear parings non-forgeability
  • 相关文献

参考文献9

  • 1Al-riyami S S,Paterson K G.Certificateless Public KeyCryptography[C]//Proceedings of ASIACRYPT’03.Berlin,Germany:Springer-Verlag,2003:452-473.
  • 2Girault M.Self-certificated Public Keys[C]//Proceedings ofEUROCRYPT’91.Berlin,Germany:Springer-Verlag,1991.
  • 3Hu Bessia,Wong Duncan,Zhang Zhenfeng,et al.CertificatelessSignature:A New Security Model and an Improved GenericConstruction[J].Designs,Codes and Cryptography,2007,42(2):109-126.
  • 4Zhang Zhenfeng,Wong Duncan,Xu Jing,et al.CertificatelessPublic-key Signature:Security Model and Efficient Construc-tion[C]//Proceedings of ACNS’06.Berlin,Germany:Springer-Verlag,2006.
  • 5Scott M.Multiprecision Integer and Rational Arithmetic C/C++Library[EB/OL].[2011-03-10].http://indigo.ie/mscott/.
  • 6Boneh D,Boyen X.Short Signatures Without RandomOracles[C]//Proceedings of EUROCRYPT’04.Berlin,Germany:Springer-Verlag,2004:56-73.
  • 7Du Hongzhen,Wen Qiaoyan.Efficient and Provably-secureCertificateless Short Signature Scheme from Bilinear Pairings[J].Computer Standards and Interfaces,2009,31(2):390-394.
  • 8Fan C I,Hsu R H,Ho P H.Truly Non-repudiation CertificatelessShort Signature Scheme from Bilinear Pairings[J].Journal ofInformation Science and Engineering,2011,27(1):969-982.
  • 9葛爱军,陈少真.两种无证书签密方案的安全性分析[J].信息工程大学学报,2010,11(2):132-136. 被引量:1

二级参考文献11

  • 1Wu Chenhuang,Chen Zhixiong.A new efficient certificateless signcryption scheme[C]//International Symposium on Information Science and Engineering,2008:661-664.
  • 2Selvi S,Civek S,Shukla D,et al.Efficient and provably secure certificateless multi-receiver signcryption[C]//ProvSec 2008.Springer-Verlag,2008:52-67.
  • 3Li Fagen,Masaaki S,Tsuyoshi T.Certificateless hybrid signcryption[C]//ISPEC 2009.Springer-Verlag,2009:112-123.
  • 4Zheng Yuliang.Digital signcryption or how to achieve cost (signature & encryption)《《cost (signature)+cost (encryption)[C]//CRYPTO 1997.Springer-Verlag,1997:165-179.
  • 5Baek J,Steinfeld R,Zheng Y.Formal proofs for the security of signcryption[C]//PKC 2002.Springer-Verlag,2002:80-198.
  • 6Libert B,Quisquater J.Efficient signcryption with key privacy from gap Diffie-Hellman groups[C]//PKC 2004.Springer-Verlag,2004:187-200.
  • 7Malone-Lee J.Identity-based Signcryption[EB/OL].[2008-08-10].http://eprint.iacr.org/2002/098.
  • 8Chen Liqun,Malone-Lee J.Improved Identity-based Signcryption[C]//PKC 2005.Springer-Verlag,2005:362-379.
  • 9Barreto P S,Libert B,Mocullagh,et al.Efficient forward and procably secure ID-based signature and signcryption from bilinear maps[C]//ASIACRYPT 2005.Springer-Verlag,2005:515-532.
  • 10Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]//ASIACRYPT 2003.Springer-Verlag,2003:452-473.

同被引文献43

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2辛向军,李发根,肖国镇.一种基于短签名和离线半可信第三方的公平交换协议[J].西安电子科技大学学报,2007,34(1):92-95. 被引量:7
  • 3Shim K A. Security models for certificateless signature schemes revisited [J]. Information Sciences, 2015, 296: 315-321.
  • 4Shi Q, Zhang N, Merabti M. Fair signature exchange via delegation on ubiquitous networks[J]. Journal of Computer and System Sciences, 2014.
  • 5Huang Q, Yang G, Wong D S, et al. Ambiguous optimistic fair exchange: Definition and constructions [J]. Theoretical Computer Science, 2015. 562:177-193.
  • 6Du Hongzhen, Wen Qiaoyan. Efficient and Provably-secure Certificateless Short Signature Scheme from Bilinear Pairings IJ]. Computer Standards and Interfaces, 2009, 31(2): 390-394.
  • 7Fan C I, Hsu R H, Ho P H. Truly Non-repudiation Certificateless Short Signature Scheme from Bilinear Pairings [J]. Journal of Information Science and Engineering, 2011, 27(1): 969-982.
  • 8Giranlt M. Self-certified public keys [C]//Advances in Cryptology-- EUROCRYPT' 91. Springer Berlin Heidelberg, 1991: 490-497.
  • 9Boneh D, Boyen X. Short Signatures Without Random Oracles [C]//Proceedings of EUROCRYPT' 04. Berlin, Germany: Springer-Verlag, 2004: 56-73.
  • 10Shamir A. Identity-based Cryptosystems And Signature Schemes ~ C ~//Proceedings of Cryptology-Crypto ' 84. Washington D. C., USA : IEEE Press, 1984:47-53.

引证文献6

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部