期刊文献+

无证书聚合签名方案 被引量:13

Certificateless Aggregate Signature Scheme
下载PDF
导出
摘要 聚合签名通过聚合n个签名(n个不同签名者对n个不同消息生成)为一个签名,节省带宽和提高签名验证效率。无证书公钥密码体制解决了传统公钥密码体制中的证书管理问题以及基于身份密码体制中的密钥托管问题。该文基于双线性对提出一个新的高效的无证书聚合签名方案。分析表明,在随机预言机模型中计算性Diffie-Hellman假设下,所提方案能够抵抗适应性选择消息攻击下的存在性伪造攻击,同时所提方案签名长度独立于签名者的数量仅为2个群元素,签名验证中仅需要4个对和n个标量乘运算,因此该方案更加适合资源受限网络环境中的应用。 Aggregate signatures allow an efficient algorithm to aggregate n signatures of n distinct messages from n different signers into one single signature. Aggregate signature is useful to save bandwidth and improve the efficiency in verification phase. Certificateless public key cryptography overcomes the complicated certificate management in traditional public key cryptography and key escrow problem in identity based cryptography. In this paper, we present a new efficient certificateless aggregate signature scheme based on the bilinear pairing. The analysis shows that the proposed scheme is proven existentially unforgeable against adaptive chosen message attacks under the computational Diffie-Hellman assumption in the random oracle model. The signature length is only two group elements, which is independent of the number of signers, and the signature needs only four pairings and n scalar multiplications computations in verification phase. Thus, the proposed scheme is more suitable for the applications, in resource-constrained environment.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2014年第2期188-193,共6页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(61202438) 中国博士后科学基金(2011M501427) 陕西省自然科学基金(2010JQ8017) 中央高校基本科研业务费专项基金-长安大学基础研究支持计划专项基金(CHD2012JC047)
关键词 双线性对 无证书聚合签名 无证书公钥密码学 随机预言机模型 bilinear pairing certificateless aggragate signature certificateless public key cryptography random oracle model
  • 相关文献

参考文献18

  • 1DIFFIE W, HELLMAN M E. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, IT-22(6): 644-654.
  • 2SHAMIR A. Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology-CRYPTO'84. Berlin: Springer-Verlag, 1984,47-53.
  • 3Al-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]//Advances in Cryptology- ASIACRYPT'03. Berlin: Springer-Verlag, 2003, 452-473.
  • 4KENT S, LYNN C, SEO K. Secure border gateway protocol (Secure-BGP)[J]. IEEE Journal on Selected Areas in Communications, 2000, 28(4): 582-592.
  • 5BONEN D, GENTRY C, LYNN B, et al, Aggregate and erifiably encrypted signatures from bilinear maps[C]/1 Advances in Cryptology-EUROCRYPr03. Berlin: Springer-Verlag, 2003, 416-432.
  • 6LYSYANSKAYA A, MICALI S, REYZIN L, et aI. Sequential aggregate signatures from trapdoor permutations[C]/IAdvances in Cryptology- EUROCRYPr 04. Berlin: Springer-Verlag, 2004, 74-90.
  • 7SHAO Zu-hua. Enhanced aggregate signatures from pairings[C]/fThe SKLOIS Conference on Information Security and Cryptology. Berlin: Springer-Verlage, 2005, 140-149.
  • 8CREON J H, KIM Y, YOON H. A new ill-based signature with batch verification[EB/OLJ. [2011-1O-11J. http://eprint. iacr.org/2004/131.
  • 9CHENG Xing-guo, LID Jing-mei, WANG Xin-mei. Identity-based aggregate and verifiably encrypted signatures from bilinear pairing[C]/lInternational Conference on Computational Science and Its Applications. Berlin: Springer-Verlage, 2005, 1046-1054.
  • 10XU Jing, ZHANG Zhen-feng, FENG Deng-guo. ill-based aggregate signatures from bilinear pairings[C]/ICryptoiogy and Network Security. Berlin: Springer-Verlage, 2005, 110-119.

同被引文献96

  • 1程相国,刘景美,王新梅.m-挠群上一种基于身份的聚合签名方案[J].西安电子科技大学学报,2005,32(3):427-431. 被引量:3
  • 2Alriyami S S and Paterson K G. Certificateless public key cryptography[C]. Proceedings of the Cryptology-Asiacrypt Taipei, China, 2003: 452-474.
  • 3Liu Jing-wei, Zhang Zong-hua, and Chen Xian-feng Certificateless remote anonymous authentication schemes fol wireless body area networks[J]. IEEE Transactions 07 Parallel g: Distributed Systems, 2014, 25(2): 332-342.
  • 4Zhang Lei, Wu Qian-hong, Josep Domingo-Ferrerc, ctal.. Signatures in hierarchical certificateless cryptography: efficient constructions and provable security[J]. Information Sciences, 2014, 272: 223-237.
  • 5Boneh D, Gentry C, Lynn B, et al.. Aggregate and verifiably encrypted signatures from bilinear maps[C]. Proceedings of the Cryptology-Eurocrypt, Warsaw, Poland, 2003: 416-432.
  • 6Xiong Hu, Guan Zhi, Chen Zhong, et al.. An efficient certificateless aggregate signature with const pairing computations[J]. Information Sciences, 2013, 219: 225-235.
  • 7He De-biao, Tian Miao-miao, and Chen Jian-hua. Insecurity of an ef cient certi cateless aggregate signature with constant pairing computations [J]. Information Sciences, 2014 268: 458-462.
  • 8Gong Zheng, Long Yu, Hong Xuan, et al.. Two certificateless aggregate signatures from bilinear maps [C]. Proceedings of Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Qingdao, China, 2007: 188-193.
  • 9Zhang Lei and Zhang Fu-tal. A new certificateless aggregation signature shceme[J]. Computer Communications, 2009, 32(6): 1079-1085.
  • 10Au Man-ho, Mu Yi, Chen Jing,et al.. Malicious KGC attack in certificateless cryptography[C]. Proceedings of the ASIACCS2007, New York. USA. 2007: 302-31 1.

引证文献13

二级引证文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部