期刊文献+

高效可证安全的基于证书数字签名方案 被引量:1

Efficient provably secure certificate-based signature scheme
下载PDF
导出
摘要 基于证书公钥密码系统是近年来提出的一种新型公钥密码体制,它结合了传统公钥密码体制和基于身份密码体制的优点,克服了其存在的问题。利用双线性映射,提出了一个基于证书的数字签名方案,在随机预言机模型下给出了严格的安全证明。方案的安全性基于q强Diffie-Hellman问题和扩展的逆计算Diffie-Hellman问题的困难性。分析表明,所构造的新方案满足正确性和存在不可伪造性,具有较高的安全性,不仅简化了证书管理过程,克服了密钥托管问题,而且方案的整体性能比较高。 The certificatebased encryption is a new public key encryption paradigm which combines public key encryption and identitybased encryption while it preserves their features. This paper proposes an efficient construction of certificatebased sig nature scheme using bilinear maps, with rigorous security proofs under the random oracle model. The security of the scheme is based on the infeasibility of the qstrong DiffieHellman problem and the expand inversed computational DiffieHellman prob lem. The analysis shows that this new scheme satisfies the security requirements such as correctness and unforgeability, and has high security. It not only simplifies the certificate management process, but also overcomes the private key escrow problem. Fur thermore, its overall performance is relatively high.
出处 《计算机工程与应用》 CSCD 2013年第24期55-60,共6页 Computer Engineering and Applications
基金 国家自然科学基金(No.61170246) 福建省自然科学基金(No.2012J01295)
关键词 数字签名 基于证书 随机预言模型 可证明安全 双线性对 digital signature certificate-based random oracle model provably secure bilinear pairings
  • 相关文献

参考文献24

  • 1Shamir A.Identity-based cryptosystems and signature schemes[C]// LNCS 196 : CRYPTO 1984.Berlin: Springer-Verlag, 1985 : 47-53.
  • 2Gentry C.Certificate-based encryption and the certificate revo- cation problem[C]//LNCS 2656: EUROCRPYT 2003.Berlin: Springer-Verlag, 2003 : 272-293.
  • 3Kang B G, Park J H, Hahn S G.A certificate-based signature scheme[C]//LNCS 2964: CT-RSA 2004.Berlin: Springer-Verlag, 2004-99-111.
  • 4Li J, Huang X, Mu Y, et al.Certificate-based signature: security model and efficient construction[C]//LNCS 4582:EuroPKI' 07. Berlin: Springer, 2007: 110-125.
  • 5Liu K, Baek J, Susilo W, et al.Certificate-based signature schemes without pairings or random oracles[EB/OL].[2013-03-10]. http://eprint.iacr.org/.
  • 6Wu Wei, Mu Yi, Susilo W, et al.Certificate-based signatures revisited[J].Joumal of Universal Computer Science,2009, 15 (8) : 1659-1684.
  • 7王雯娟,黄振杰,郝艳华.一个高效的基于证书数字签名方案[J].计算机工程与应用,2011,47(6):89-92. 被引量:17
  • 8李志敏,徐馨,李存华.高效的基于证书数字签名设计方案[J].计算机应用研究,2012,29(4):1430-1433. 被引量:6
  • 9杨波,肖自碧.基于证书的签名方案[J].北京邮电大学学报,2012,35(5):73-76. 被引量:6
  • 10陈江山,黄振杰.一个高效的基于证书签名方案[J].计算机工程与应用,2012,48(30):98-102. 被引量:8

二级参考文献117

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of CRYPTO 84 on Advances in Cryptology, LNCS 196. Berlin: Springer-Verlag, 1985:47 -53.
  • 2AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography [ C]// Cryptology-Asiacrypt 2003, LNCS 2894. Berlin: Springer-Verlag, 2003:452-473.
  • 3HUANG XIN-YI, SUSILO W, MU YI, et al. On the security of certifieateless signature schemes from Asiacrypt 2003 [ C]//Cryptology and Network Security: CANS 2005, LNCS 3810. Berlin: Springer- Verlag, 2005:13-25.
  • 4YUM D H, LEE P J. Generic construction of certificateless signature [ C]//Australasian Conference on Information Security and Privacy: ACISP 2004, LNCS 3108. Berlin: Springer-Verlag, 2004: 200 -211.
  • 5HUB C, WONG D S, ZHANG ZHEN-FENG, et al. Key replacement attack against a generic construction of certificateless signature [ C]// Australasian Conference on Information Security And Privacy: ACISP2006, LNCS4058. Berlin: Springer-Verlag, 2006:235 - 246.
  • 6ZHANG ZHEN-FENG, WONG D S, XU JING, et al. Certificateless public-key signature: Security model and efficient construction [ C]// Fourth International Conference on Applied Cryptography and Network Security: ACNS 2006, LNCS 3989. Berlin: Springer-Verlag, 2006:293-308.
  • 7GORANTLA M C, SAXENA A. An efficient certfficateless signature scheme [ C]//Proceedings of Computational Intelligence and Security: CIS 2005, LNAI 3802. Berlin: Springer-Verlag, 2005: 110- 116.
  • 8YAP W-S, HENG S-H, GOI B-M. An efficient certificateless signature scheme [ C]// Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006, LNCS 4097. Berlin: Springer-Verlag, 2006:322-331.
  • 9GOYA G H. Proposta de esquemas de criptografia e de assinatura sob modelo de criptografia de cha publica sem certificado [ EB/OL]. [ 2008 -09 -22 ]. http://www, ime. usp. br/- dhgoya./dis_denise. pdf.
  • 10CAO XUE-FEI, PATERSON K G, KOU WEI-DONG. An attack on a certificateless signature scheme: Cryptology ePrint Archive, Report 2006/367 [ R/OL]. (2006 - 10 -25) [2008 -09 - 12]. http://eprint, iacr. org/2006/367.

共引文献66

同被引文献19

  • 1Gentry C. Certificate-based encryption and the certificate revocation problem [A]. Biham E., ed. In: Eurocrypt 2003, LNCS: 2656 [C]. Berlin: Springer-Verlag, 2003:272-293.
  • 2Gutmann P. PKI: It's not dead, just resting [J]. IEEE Computer, 2002, 35(8): 41-49.
  • 3Shamir A. Identity-based cryptosystems and signature schemes [A]. Blakely, G.R., Chaum, D, ed. In: CRYPTO'84. LNCS:196 [C]. Berlin: Springer-Verlag, 1984: 47-53.
  • 4AI-Riyami S, Paterson K. Certificateless public key cryptography [A]. Lee PJ., ed. In: ASIACRYPT "03. LNCS: 2894 [C]. Bedim Springer-Verlag, 2003:452-473.
  • 5Wu W, Mu Y, Susilo W, et al. Certificate-Based signatures revisited [J]. Journal of Universal Computer Science, 2009, 15(8): 1659-1684.
  • 6Man H, Liu J, Susilo W, et al. Certificate based (linkable) ring signature [A]. E. Dawson and D.S. Wong (Eds.). In: ISPEC 2007, LNCS 4464 [C]. Berlin: Springer-Verlag, 2007: 79-92.
  • 7Li J, Zhang Y, Teng H. A forward-secure certificate-based signature scheme in the standard model [A]. Y. Xiang, Lopez,Javier, Kuo, C. -C Jay (Eds.).In: CSS 2012, LNCS 7672 [C]. Berlin: Springer-Verlag, 2012:362-376.
  • 8Li J, Huang X, Zhang Y, et al. An efficient short certificate-based signature scheme [J]. The Journal of Systems and Software, 2012(85): 314-322.
  • 9Li J, Xu L, Zhang Y. Provably secure certificate-based proxy signature schemes [J]. Journal of Computers, 2009, 4(6): 444-452.
  • 10Wang S H, Chang S Q. Construetion of lightweight certificate-based signature and application in cloud computing [A]. L.Sun,H.Ma, and F. Hong (Eds.).In: CWSN 2013, CCIS 418 [C]. Bedim Springer-Verlag, 2013: 61-70.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部