期刊文献+

基于离散对数问题的可截取签名方案 被引量:7

Content Extraction Signature Scheme Based on DLP
下载PDF
导出
摘要 在朱辉等提出的无证书签密方案(计算机研究与发展,2010年第9期)基础上,提出一种满足强安全性、无需双线性对运算的可截取签名方案。通过将用户公钥绑定在部分私钥的生成算法及签名算法中,降低公钥替换攻击的威胁,利用安全哈希函数的不可碰撞性,使方案能抵抗适应性选择消息的存在性伪造攻击,并在随机预言模型下基于离散对数难题给出安全性证明。与同类方案相比,该方案的签名及可截取算法减少了一个指数运算,计算效率有所提高。 According to the certificateless signcryption scheme proposed by Zhu Hui et al, this paper proposes a strongly secureContent Extraction Signature(CES) scheme without bilinear operations. The user's public key is bound to the partial private key generation algorithm and signature algorithm, which reduces the possibility of user's public key substitution attack. By using secure hash function of a non-collision, it can resist existence unforgeable under adaptive chosen-message attacks. Based on Discrete Logarithm Problem(DLP) is intractable, and its security is proved under Random Oracle Model(ROM). Compared with similar programs, the scheme's signature and interception algorithm reduces one exponentiation computation, the computational efficiency is improved.
出处 《计算机工程》 CAS CSCD 2013年第4期132-136,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61063041 61163038 61202395)
关键词 可截取签名 离散对数问题 无证书 随机预言模型 适应性选择消息攻击 存在性伪造 Content Extraction Signature(CES) Discrete Logarithm Problem(DLP) certificateless Random Oracle Model(ROM) adaptability chosen-message attack existential forgery
  • 相关文献

参考文献10

二级参考文献48

  • 1刘颖,胡予濮,王飞,卢晓君.一个高效的基于身份的门限签名方案[J].西安电子科技大学学报,2006,33(2):311-315. 被引量:13
  • 2刘军龙,王彩芬.基于身份的可截取门限签名方案[J].计算机应用,2006,26(8):1817-1820. 被引量:7
  • 3Al-Riyami S S,Paterson K G.Certificateless Public Key Cryptography[C] //Proc.of ASIACRYPT'03.Berlin,Germany:Springer-Verlag,2003:452-473.
  • 4Pointcheval D,Stern J.Security Arguments for Digital Signatures and Blind Signatures[J].Journal of the International Association for Cryptologic Research,2000,13(3):361-396.
  • 5Rafael C,Ricardo D.Two Notes on the Security of Certificateless Signatures[C] //Proc.of Conf.on Security.Berlin,Germany:Springer-Verlag,2007:85-102.
  • 6Zheng Yuliang.Digital signcryption or how to achieve cost (signature and encryption) 《《 cost (signature) + cost (encryption)[G] //LNCS1294,CRYPTO'1997.Berlin:Springer,1997:165-179.
  • 7AI-Riyami S S,Paterson K G.Certificateless public key cryptography[G] //LNCS2894:Asiacrypt'03.Berlin!Springer,2003:452-473.
  • 8Shamir A.Identity-based cryptosystems and signature schemes[G] //LNCS196:CRYPTO'1984.Berlin; Springer,1984:47-53.
  • 9Aranha D,Castro R,Lopez J,et al.Efficient certificateless signcryption[EB/OL].(2008-09-05)[2009-03-21].http.//sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_01_resumo.pdf.
  • 10Wu Chenhuang,Chen Zhixiong.A new efficient certificateless signcryption scheme[C] //Proc of ISISE'08.Piscataway,NJ:IEEE,2008:661-664.

共引文献71

同被引文献49

  • 1卢鹏菲,詹雄泉,洪景新.基于椭圆曲线的有序多重数字签名方案[J].厦门大学学报(自然科学版),2005,44(3):341-343. 被引量:9
  • 2罗丽平,施荣华,刘宇.基于RSA的ElGamal型有序多重数字签名方案[J].计算机工程与应用,2006,42(1):120-121. 被引量:4
  • 3刘军龙,王彩芬.基于身份的可截取门限签名方案[J].计算机应用,2006,26(8):1817-1820. 被引量:7
  • 4胡越梅,朱艳琴.一个基于ECC的多重数字签名方案[J].微电子学与计算机,2007,24(1):180-182. 被引量:3
  • 5STEINFELD R, BULL L, ZHENG Y. Content extrac- tion signatures[C]//Proceedings of 4th Internation- al Conference on Information Security and Cryp- tology(ICISC 2001). Berlin: Springer Verlag, 2001: 285-304.
  • 6RIVEST R, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public key cryp- tosystem[J]. Communications of the ACM, 1978, 21(2): 120-126.
  • 7LI Jin, ZHANC Fang-guo. Generic Security- amplifying methods of ordinary digital signatures[J]. Information Sciences, 2012, 201(15): 128-139.
  • 8BULL L, STANSKI P, MCC S R D. Content ex- traction signatures using xml digital signatures and custom transforms on 3/demandIC]//Proceedings of the 12th International World Wide Web confer- ence (WWW 2003). New York" ACM Press, 2003, 170-177.
  • 9BULL L, MCG S R D, ZHENG Y. A hierarchi- cal extraction policy for content extraction signa- tures[J]. International Journal on Digital Libraries, 2004, 4(3): 208-222.
  • 10SHAMIR A. Identity-based cryptosystems and sig- nature schemesIC]//Advances in Cryptology CRYP Top 84: LNCS196. Berlin: Springer-Verlag, 1984: 47-53.

引证文献7

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部