期刊文献+

无线网络中的一种在线/离线数字签名算法 被引量:1

Online/Offline Digital Signature Algorithm in Wireless Networks
下载PDF
导出
摘要 基于间隙Diffie-Hellman(GDH)群,构造了一种应用于无线网络的在线/离线签名算法。该算法减轻了无线网络环境下终端的在线计算量,同时保证签名的安全性,适合于终端计算能力比较弱的无线网络通讯环境。 Based on gap Diffie-Hellman(GDH) group,an online/offline signature algorithm is constructed and applied in wireless networks.The algorithm reduces the online calculation,and ensures the security of the signature.It suits the terminal when computing power is weak in wireless network communication.
作者 王林
出处 《桂林理工大学学报》 CAS 北大核心 2013年第2期339-344,共6页 Journal of Guilin University of Technology
基金 广西科技计划项目(2013DB017)
关键词 无线网络 在线 离线签名 安全性 wireless networks online/offline signature security
  • 相关文献

参考文献11

  • 1Shamir A,Tauman Y. Improved online/offline signatureschemes [ C ] //Proc. of the 21st Annual InternationalCryptology Conference on Advances in Cryptology. London:Springer-Verlag, 2001 : 355 - 367.
  • 2Girault M,Poupard G,Stem J. On the fly authentication andsignature schemes based on groups of unknown order [ J ].Journal of Cryptology, 2006, 19 ( 4) : 463 -487.
  • 3Bellare M,Neven G. Multi-signatures in the plain public-keymodel and a general forking lemma [ C ] //Proceedings of13th ACM Conference on Computer and Communications Secu-rity. New York: ACM Press, 2006: 390-399.
  • 4Bagherzandi A,Cheon J H, Jarecki S. Multi-signatures se-cure under discrete logarithm assumption and a generalized for-king lemma [C] //Proceedings of the 15th ACM Conferenceon Computer and Communication Security. New York: ACMPress, 2008: 449-458.
  • 5Boldyreva A. Threshold signature, multisignatures, multisigna-tures and blind signatures based on gap-Diffie-Hellman-groupsignature scheme[ M]//Public Key Crypotgraphy - PKC 2003.Berlin Heidelberg: Springer,2003 ; 31 -46.
  • 6Boneh D, Lynn B,Shacham H. Short signatures from theweil pairing [ J]. Journal of Cryptology, 2004, 17 ( 4):297 -319.
  • 7Steiner M, Tsudik G, Waidner M. Diffie-Hellman key distri-bution extended to group communication [ C ] //Proceedingsof the ACM Conference on Computer and Communications Se-curity. New York: ACM Press, 1996: 31 -37.
  • 8王巍,马建峰,杨世平,赵文红.动态对等群组中高效安全的群组密钥管理方案[J].吉林大学学报(工学版),2008,38(1):131-136. 被引量:4
  • 9Shamir A, Tauman Y. Improved online offline signatureschemes [ C ] //Advances in Cryptology-CRYPTO 2001.Berlin Heidelberg: Springer-Verlag, 2001 : 355 -367.
  • 10Krawczyk H,Rabin T. Chameleon hashing and signatures[C]//Proceedings of Symposium on Network and Distribu-ted Systems Security. San Diego, 2000: 143 -154.

二级参考文献29

  • 1EVEN S,GOLDREICH O,MICALI S V.On-line/off-line digital signatures[C]//Proc of Advances in Cryptdogy.New York:Springer-Verlag,1989:263-275.
  • 2SHAMIR A,TAUMAN Y.Improved online/offline signature schemes[C]//Proc of the 21st Annual International Cryptology Conference on Advances in Cryptology.London:Springer-Verlag,2001:355-367.
  • 3GIRAULT M,POUPARD G,STERN J.On the fly authentication and signature schemes based on groups of unknown order[J].Journal Cryptology,2006,19(4):463-487.
  • 4CHEVALLIAR-MAMES B,JOYE M.A practical and tightly secure signature scheme without hash function[C]//Proc of CT-RSA 2007.[S.l.]:Springer,2007:339-356.
  • 5JOYE M.An efficient online/offline signature scheme without random oracles[C]//Proc of CANS 2008.[S.l.]:Springer,2008:98-107.
  • 6GUO Fu-chun,MU Yi.Optimal online/offline signature:how to sign message without online computation[C]//Proc of the 2nd Internatio-nal Conference on Provable Security.Berlin/Heidelberg:Springer-Verlag,2008:98-111.
  • 7MICALI S,OHTA K,REYZIN L.Accountable-subgroup multi-signatures:extended abstract[C]//Proc of ACM Conference on Compu-ter and Communications Security.[S.l.]:ACM Press,2001:245-254.
  • 8BOLDYREVA A.Threshold signature,multisignatures,multisignatures and blind signatures based on gap-Diffie-Hellman-group signature scheme[C]//Proc of Public Key Crypotgraphy.Berlin/Heidelberg:Springer,2003:31-46.
  • 9LU S,OSTROVSKY R,SAHAI A,et al.Aggregate sequential signatures and multi-signatures without random oracle[C]//Proc of EUROCRYPT.[S.l.]:Springer,2006:465-485.
  • 10BELLARE M,NEVEN G.Multi-signatures in the plain public-key model and a general forking lemma[C]//Proc of ACM Conference on Computer and Communication Security.[S.l.]:ACM Press,2006:390-399.

共引文献4

同被引文献16

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [ C]//Proceedings of CRYPTO '84 on Advances in Cryptology. Ber- lin: Springer, 1984:47-53.
  • 2BONEH D, FRANKLIN M. Identity-based encryption from the Well pairing [ J]. SIAM Journal of Computing, 2001,32(3) : 586 -615.
  • 3WARTERS B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions [ M]// HALEVI S. Advances in Cryptology-CRYPTO 2009, LNCS 5677. Berlin: Springer, 2009:619 - 636.
  • 4HORWrFZ J, LYNN B. Toward hierarchical identity-based encryption [ EB/OL]. [ 2015- 02- 04]. http://citcsecrx, ist. psu. edu/viewdoe/ download?doi = 10.1.1. 414. 2568&rep = repl&type = pelf.
  • 5BONEH D, BOYEN X, GOH E-J. Hierarchical identity based en- cryption with constant size ciphertext [ M]//CRAMER R. Advances in Cryptology-EUROCRYPT2005, LNCS 3494. Berlin: Springer, 2005: 440 - 456.
  • 6GENTRY C, HALEVI S. Hierarchical identity based eneryption with polynomially many levels [ M ]// REINGOLD O. Theory of Cryptography, LNCS 5444. Berlin: Springer, 2009:437-456.
  • 7LEWKO A, WARTERS B. New techniques for dual system encryp- tion: and fully secure HIBE with short eiphertexts [ M]// MIC- CIANCIO D. Theory of Cryptography, LNCS 5978. Berlin: Spring- er, 2010:455 -479.
  • 8EVEN S, GOLDREICH O, MICALI S. Online/off-line digital sig- natures [ C] //Proceedings on Advances in Cryptology. New York: Springer, 1989:263 -275.
  • 9GUO F, MU Y, CHEN Z. Identity-based online/offline encryption [ M l// TSUDIK G. Financial Cryptography and Data Security, LNCS5143. Berlin: Springer, 2008:247-261.
  • 10CHOW S S M, L|U J K, ZHOU J. Identity-based online/offline key encapsulation and encryption [ EB/OL]. [ 2015- 01- 11 ]. ht- tp://eprint, iacr. org/2010/194, pdf.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部