期刊文献+

无双线性对的可证安全的高效的代理签名方案 被引量:1

Provable Secure and Efficient Proxy Signature Scheme without Bilinear Pairings
下载PDF
导出
摘要 目前已提出的代理签名方案存在两个问题,首先缺乏在完整的代理签名安全模型下证明方案的安全性;其次一些安全性可归约于CDH问题或者其他问题的方案都含有双线性对的计算,由于双线性对的计算需要较多的时间,因此这些方案的计算性能不高.本文在EDL签名方案的基础上提出一种新的代理签名方案—Proxy-EDL签名方案,该方案是对EDL签名方案的扩展,方案中没有双线性对的计算,具有较高的计算性能,同时新方案在代理签名安全模型下被证明具有在自适应选择消息攻击下存在代理签名不可伪造性,其安全性可归约于CDH问题.与目前已有的代理签名方案相比,本文的代理签名方案具有更高的安全性和更好的计算性能. There are two major problems in the existing proxy signature schemes. Firstly, the existing proxy signature schemes are not proved for their security in the intact provable security model for proxy signature. Secondly, some proxy signature schemes which have security reduction to CDHP or other problems are based on bilinear pairing operation, but bilinear pairing operation needs much time, so the schemes have low computational efficiency. In this paper, we show a new proxy signature scheme based on the EDL sig- nature scheme--Proxy-EDL signature scheme. The new scheme is an extension of the EDL signature scheme, which is not based on bilinear pairing operation, so the new scheme has high computational efficiency. And the new scheme is proved to have the existential proxy signature unforgerability under an adaptive chosen message attack in the provable security model for proxy signature, which has a security reduction to CDHP. Comparing with other existing proxy signature schemes, the new scheme is more efficient and secure.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第6期1382-1386,共5页 Journal of Chinese Computer Systems
基金 香港城市大学研究基金项目(9681001)资助 湖南省高等学校科学研究项目(11C0746)资助
关键词 代理签名 可证安全性 效率 EDL签名 归约 proxy signature provable security efficiency EDL signature reduction
  • 相关文献

参考文献18

  • 1Tal Malkin, Satoshi Obana, Moti Yung. The hierarchy of key evol- ving signatures and a characterization of proxy signatures[ C]. Eu- roCrypt 2004, Berlin: Springer, LNCS3027,2004 : 306-322.
  • 2Cui Shen-jun, Wen Feng-tong. Improvement of a forward-secure proxy signature scheme[ C]. Computer Engineering and Technol- ogy (ICCET) ,2010:441 444.
  • 3Paterson K G, Schuldt J C N. Efficient identity-based signatures se- cure in the standard model [ C ]. ACISP' 2006, Springer, LNCS, 2006 : 207 -222.
  • 4Mihir Bellare, Phillip Rogaway. The exact security of digital signa- tures-how to sign with RSA and Rabin~ C]. Proceedings of EURO- CRYPT, 1996, Berlin: Springer, LNCS1070 ,1996 :399-416.
  • 5Dan Boneh,Xavier Boyen. Short signatures without random oracles [ C ]. EuroCrytp 2004, Berlin : Springer, LNCS3027,2004:56-73.
  • 6夏祥胜,耿永军,洪帆,崔国华.前向安全的有代理的多重数字签名方案[J].小型微型计算机系统,2009,30(5):854-858. 被引量:4
  • 7Cha J,Cheon J. An identity-based signature from Gap Diffie-Hellman groups[ C ]. PKC 2003, Berlin: Springer,LNCS ,2003 : 18-30.
  • 8Sun Ying, Xu Chun-xiang, Yu Yong, et al. Improvement of a proxy multi-signature scheme without random oracles [ J ]. Computer Communications, 2011,34 ( 3 ) :257-263.
  • 9David Chaum, Torben Pryds Pedersen. Wallet databases with ob- servers[C]. In Ernest Brickell, editor, Proceedings of Crypto, LNCS, 1992, Berlin : Springer, LNCS0740 ,1992 :89-105.
  • 10Alexandra Boldyreva, Adriana Palacio, Bogdan Warinschi. Secure proxy signature schemes for delegation of signing rights[ R]. Cryp- tology Print Archive, Report 2003/096,2003.

二级参考文献12

  • 1李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 2王晓明,符方伟,张震.前向安全的多重数字签名方案[J].计算机学报,2004,27(9):1177-1181. 被引量:22
  • 3王晓明,陈火炎,符方伟.前向安全的代理签名方案[J].通信学报,2005,26(11):38-42. 被引量:35
  • 4王连海,王英龙.基于DLP的有代理的多重数字签名方案研究[J].通信学报,2005,26(12):37-42. 被引量:4
  • 5H M Sun. Design of Time-Stamed Proxy Signatures with Traceable Receivers[J]. IEEE Proc Computers & Digital Techniques, 2000,147(6) :462 - 466.
  • 6F Zhang, K Kim. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings[ A]. ACISP 2003 [ C ]. Berlin: Springer- Vedag, LNCS 2727,2003 : 312 - 323.
  • 7K Zhang. Threshold Proxy Signature Schemes[A]. 1997 Informarion Security Workshop[ C ]. Japan: Academic Press, 1997, 191 - 197.
  • 8L Yi, G Bai, G Xiao. Proxy multi-signature scheme: A new type of proxy signature scheme [ J ]. Electron Lett, 2000, 36 (6) :527 - 528.
  • 9R Lu,Z Cao. Designated Verifier Proxy Signature Scheme with Message Recovery[J]. Applied Mathematics and Computation, 2005,169(7) : 1237 - 1246.
  • 10F Zhang, R Safavi-Naini, C Lin. New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings[R]. Cryptology ePrint Archive, 2003.

共引文献8

同被引文献18

  • 1CHENG Hong-bing,YANG Geng,WANG Jiang-tao,HUANG Xiao.An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(2):31-38. 被引量:8
  • 2Pathak P H, Dutta R. A survey of network design prob- lems and joint design approaches in wireless mesh net- works [ J~. IEEE Communications Surveys & Tutorials, 2011,13(3) :396 -428.
  • 3Du W,Deng J,Han Y S,et al. A pair wise key pre-distri- bution scheme for wireless sensor networks [ J]. Interna- tional Journal of Innovative Technology & Exploring Engi- neering, 2003,8 ( 2 ) :42 - 51.
  • 4Camtepe S A, Yener B. Combinatorial design of key distri- bution mechanisms for wireless sensor networks [ J]. Lec- ture Notes in Computer Science,2004,15 (2) :346 - 358.
  • 5Ihriq J, Mahgoub I. A hierarchical key establishment scheme for wireless sensor networks [ C ]//21st Interna- tional Conference on Advanced Information Networking and Applications, 2007 ( AINA ' 07 ). Niagara Falls, Ontario : IEEE ,2007:210 - 219.
  • 6Yang G,Wong D S,Deng X. Anonymous and authenticated key exchange for roaming networks [J]. IEEE Transactions on Wireless Communications,2007,6(9) :3461 - 3472.
  • 7Yang G, Wong D S, Deng X. Formal security definitionand efficient construction for roaming with a privacy-pre- serving extension[ J]. Journal of Universal Computer Sci- ence ,2008,14 ( 3 ) :441 - 462.
  • 8Li Z,Gong G. Computationally efficient mutual entity au- thentication in wireless sensor networks I J]. Ad Hoc Net- works, 2011,9 ( 2 ) : 204 - 215.
  • 9Han K. Untraceable mobile node authentication in WSN [J]. Sensors,2010,10(5) :4410 -4429.
  • 10He D, Bu J, Chan S, et al. Privacy-preserving universal authentication protocol for wireless communications [ J]. IEEE Transactions on Wireless Communications, 2011,10 (2) :431 -436.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部