期刊文献+

一个双线性对下高效的基于证书签名方案 被引量:7

An efficient certificate-based signature scheme with bilinear pairing
下载PDF
导出
摘要 为了提高基于证书签名方案的效率和保证其不可伪造性,利用k双线Diffie-Hellman求逆问题的困难性和计算Diffie-Hellman问题的困难性构造了一个新的高效基于证书签名方案,并且在随机预言机模型下,形式化证明了其安全性.方案中,利用k双线Diffie-Hellman求逆问题的困难性来设计用户公钥和用户证书生成算法,保证用户公钥和用户证书的单向性质;利用k双线Diffie-Hell-man求逆问题的困难性和计算Diffie-Hellman问题的困难性来设计签名算法,保证签名的单向性质和不可伪造性.所构造方案的签名生成算法不需要任何双线性对计算,签名验证算法仅需要一个双线性对计算.与已有的基于证书签名方案进行了效率比较.结果表明:所提出的基于证书签名方案具有较大的效率优势. In order to improve the efficiency and guarantee the unforgery of certificate-based signature scheme,a new efficient certificate-based signature scheme was proposed based on the k-bilinear Diffie-Hellman Inverse(k-BDHI) problem and the Computational Diffie-Hellman(CDH) problem.The security of the proposed scheme was proved by random oracle model(ROM).According to the difficulty of k-BDHI problem and the CDH problem,user public key and certificate generating algorithms were designed to guarantee the one-way of public key and certificate.User signature generating algorithm was also designed by the difficulty of k-BDHI problem and the CDH problem to ensure signature one-way and unforgery.In the proposed scheme,no bilinear pairing computation was needed in the signature generate algorithm,and only one was need in verification algorithm.The efficiency of the proposed scheme was compared with those of the available certificate-based signature schemes.The results show that the proposed scheme is more efficient than the available certificate-based signature schemes.
出处 《江苏大学学报(自然科学版)》 EI CAS CSCD 北大核心 2013年第3期320-325,共6页 Journal of Jiangsu University:Natural Science Edition
基金 国家自然科学基金资助项目(61170246) 福建省自然科学基金资助项目(2012J01295) 福建省计算机应用技术和信号与信息系统研究生教育创新基地资助项目(闽高教[2008]114号)
关键词 数字签名 基于证书签名 随机预言机 双线性对 可证明安全性 digital signature certificate-based signature random oracle model(ROM) bilinear pairing provable security
  • 相关文献

参考文献10

  • 1Gentry C. Certificate-based encryption and the certificaterevocation problem [C] // Proceedings of EUROCRPYT2003,LNCS 2656. Berlin : Springer-Verlag, 2003 : 272-293.
  • 2Kang B G, Park J H, Hahn S G. A certificate-basedsigature scheme [ C] // Proceedings of CT-RSA 2004,LNCS 2964. Berlin: Springer-Verlag, 2004: 99-111.
  • 3Liu J K,Baek J, Susilo W,et al. Certificate-based sig-nature schemes without pairings or random oracles [ C]// Proceedings of ISC 2008,LNCS 5222. Berlin:Springer-Verlag, 2008 : 285 -297.
  • 4Zhang Jianhong. On the security of a certificate-basedsignature scheme and its improvement with pairings[ C]// Proceedings of I SPEC 2009. Heidelberg : Springer-Verlag, 2009:47 -58.
  • 5Wu Wei, Mu Yi, Susilo Willy, et al. Certificate-basedsignatures re-visited[ J]. Journal of Universal ComputerScience,2009,15(8): 1659 - 1684.
  • 6王雯娟,黄振杰,郝艳华.一个高效的基于证书数字签名方案[J].计算机工程与应用,2011,47(6):89-92. 被引量:17
  • 7Li Jiguo, Huang Xinyi, Zhang Yichen,et al. An effi-cient short certificate-based signature scheme [ J]. TheJournal of Systems and Software ,2012,85 :314 - 322.
  • 8Liu J K, Bao F, Zhou J Y. Short and efficient certifi-cate-based signature [ C] // Proceedings of NETWOR-KING 2011 Workshops. Berlin : Springer-Verlag, 2011:167-178.
  • 9Cheng Lin, Xiao Ying, Wang Gang. Cryptanalysis of acertificate-based on signature scheme [ J]. Procedia En-gineering ,2012,29: 2821 -2825.
  • 10陈江山,黄振杰.一个高效的基于证书签名方案[J].计算机工程与应用,2012,48(30):98-102. 被引量:8

二级参考文献22

  • 1Gentry C.Certificate-based encryption and the certificate revoca- tion problem[C]//Biham E.LNCS 2656:Cryptology-Eurocrypt 2003.[S.1.] : Springer-Verlag, 2003 : 272-293.
  • 2Yum D H, Lee P J.Identity-based cryptography in public key management[C]//LNCS 3093 : EuroPKI 2004.[S.1.]: Springer, 2004: 71-84.
  • 3Galindo D, Morillo P, Rafols C.Breaking Yttm and Lee generic constructions of certificate-less and certificate-based eneryption schemes[C]//LNCS 4043:EuroPKl 2006.[S.1.]:Springer,2006:81-91.
  • 4Dodis Y, Katz J.Chosen-Ciphertext security of multiple eneryp- tion[C]//LNCS 3378: Theory of Cryptography Conference, TCC 2005.[S.1.] : Springer, 2005: 188-209.
  • 5Al-riyami S,Paterson K G.CBE from CL-PKE:A generie con- struction and efficient scheme[C]//LNCS 3386:Public Key Cryp- tography, PKC 2005. [S.1.] : Springer, 2005 : 398-415.
  • 6Kang B G,Park J H.It is possible to have CBE from CL-PKE? Report 2005/431 [R/OL].2005.http://eprint.iaer.org/.
  • 7Galindo D, Morillo P, Rafols C.Improved certificate-based en- cryption in the standard model[J].The Journal of Systems and Software, 2008,81 : 1218-1226.
  • 8Kang B G, Park J H, Hahn S G.A certificate-based signature scheme[C]//LNCS 2964: Ct-RSA' 04.[S.1.] : Springer, 2004: 99-111.
  • 9Li J, Huang X,Mu Y, et al.Certifieate-based signature: Security model and efficient construction[C]//LNCS 4582: EuroPKI' 07. [S.I.] : Springer, 2007:110-125.
  • 10Au M, Liu J, Susilo W, et al.Cortificate based(linkable) ring signature[C]//LNCS 4464 : ISPEC ' 07.[S.l.] : Springer,2007 : 79-92.

共引文献19

同被引文献52

  • 1张串绒,肖国镇.SK签密方案的改进及应用[J].计算机研究与发展,2006,43(z2):386-388. 被引量:1
  • 2FEIFei-yu CHENWen CHENKe-fei MAChang-she.Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security[J].Wuhan University Journal of Natural Sciences,2005,10(1):248-250. 被引量:2
  • 3胡磊.椭圆曲线Tate对的压缩(英文)[J].软件学报,2007,18(7):1799-1805. 被引量:3
  • 4Diffie W, Hellman M. New direction in cryptography. IEEE Trans. on Information Theory, 1976, IT-22(6): 644-654.
  • 5Gutmann P. PKI: It's not dead, just resting. IEEE Computer, 2002, 35(8): 41-49.
  • 6Shamir A, Identity-based cryptosystems and signature schemes. In: Blakely GR, Chaum D, eds. CRYPTO'84. Berlin. Springer-Verlag. LNCS. 1984, (196). 47-53.
  • 7AI-Riyami S, Paterson K. Certificateless public keycryptography. In: Lee PJ, ed. ASIACRYPT'03. Berlin. Springer-Verlag. LNCS. 2003, (2894). 452-473.
  • 8Gentry C. Certificate-based encryption and the certificate revocation problem. In: Biham E, ed. Eurocrypt 2003. Berlin. Springer-Verlag. LNCS. 2003, (2656). 272-293.
  • 9Girault M. Self-certified public keys. In: Donald W.D, cd. Advances in Cryptology proceeding of Eurocrypt 1991. Berlin. Springer-Verlag. LNCS. 1991, (547), 490-497.
  • 10Liu J, Au M, Susilo W. Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Weirich S, ed. Proc. of the 2nd ACM Symposium on Information, Computer and Communications Security. 2007. 273-283.

引证文献7

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部