期刊文献+

标准模型下高效的基于身份可净化签名方案 被引量:2

Efficient Identity-based Sanitizable Signature Scheme in Standard Model
下载PDF
导出
摘要 可净化签名方案中,净化者能够修改原消息的特定部分,不必与签名者交互就能生成修改消息的有效签名。利用双线性对,基于Waters技术和Li技术,提出一个标准模型下安全的基于身份可净化签名方案。安全性分析表明,所提方案能够满足不可伪造性、不可区分性和不可变性。和现有标准模型下安全方案相比,该方案计算效率高、通信代价小。 Sanitizable signature scheme allows stanitizer to modify the specific part of the original message without in- teracting with the signer to generate a valid signature to modify the message. This paper came up with an identity-based sanitizable signature scheme design based on Waters technology and Li technology under the standard model with the application of bilinear pairings. The salty analysis shows that the proposed scheme is able to satisfy the characteristics of unforgeability~ indistinguishability and immutability. Compared with the the existing salty scheme under the standard model, this design has higher computational dficiency and smaller communication cost.
作者 明洋 李瑞
出处 《计算机科学》 CSCD 北大核心 2013年第5期158-163,共6页 Computer Science
基金 国家自然科学基金项目(61202438) 中国博士后科学基金项目(2011M501427) 西安市科技计划项目(CX1258③) 中央高校基础研究支持计划资助项目(CHD2012JC047)资助
关键词 基于身份 可净化签名 标准模型 双线性对 Identity-based Sanitizable signature scheme Standard model Bilinear pairings
  • 相关文献

参考文献17

  • 1Shamir A. Identity-based cryptosystems and signature schemes [C]//Proceedings of Cryptn 1984. New York: Springer-Verlag, 1984:47-53.
  • 2Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Proceedings of Crypto 2001. LNCS 2139. London: Springer-Verlag, 2001 : 213-229.
  • 3Paterson K G. ID-based signatures from pairings on elliptic curves[J]. IEEE Comunication Letter, 2002,38(18).
  • 4Cha J C, Cheon J H. An identity-based signature from gap Dif- fie-Hellman groups[C] // Proceeding of LNCS. Heidelberg: Springer-Verlag, 2003 : 18-30.
  • 5Hess F. Efficient identity based signature schemes based on pairings[C] // Proceeding of LNCS. Heidelberg: Springer-Ver- lag, 2003 : 310-324.
  • 6Paterson K G, Sehuldt J C N. Efficient identity-based signatures secure in the standard model[C]//Proceedings of the 1 lth Aus- tralasian Conferece on Information Security and Privacy. Berlin/ Heidelberg: Springer-Velag, 2006 : 207-222.
  • 7Miyazaki K, Susaki S, Iwamura M, et al. Digital documents sani- tizing problem[J]. IEICE Technical Report, 2003,103 : 61-67.
  • 8Steinfeld R, Bull L, Zheng Y. Content extraction signatures[C]// Proceeding of Information Security and Cryptology-ICISC. Ber- lin: Springer-Verlag, 2001 : 285-304.
  • 9Ateniese G, Chou D H, de Medeiros B, et al. Sanitizable signa- tures[C]//Proceeding of Computer Security-ESORICS. Berlin: Springer-Verlag, 2005 : 159-177.
  • 10Lonowskim M, Lauks A. Extended sanitizable signatures[C]// Proceeding of Information Security and Cryptology-ICISC. Ber- lin: Springer-Verlag, 2006:343-355.

二级参考文献3

共引文献42

同被引文献5

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部