期刊文献+

可证安全的高效无证书有序多重签名方案 被引量:7

Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model
下载PDF
导出
摘要 无证书有序多重签名可用于解决信任链推荐信息的认证问题。秦艳琳等提出一个高效的无证书有序多重签名方案,并在随机语言机模型下证明方案的安全性可归约为CDH(computational Diffie-Hellman)困难问题。对该方案的安全性证明过程进行分析,指出方案难以抵抗伪造攻击:攻击者已知某个多重签名,则可以伪造其他消息的多重签名。随后构造一个更加高效的无证书有序多重签名方案,方案使用更少的双线性对,且只有一个签名消息,占用更小的计算代价和通信代价。最后证明方案在随机预言机模型下具有不可伪造性。 Certificate less sequential multi-signature scheme could resolve the problem of authentication of recommendation information transmitted through trust train. Qin yan-lin, et al proposed an efficient certificateless sequential multi-signature scheme, and proved the security is based on the fact that computational Diffie-Hellman problem is hard in the random oracle. It is found that Qin's scheme is insecure against the forgery attack after analysing the security proof. If an adversary has obtained the signers' multi-signature, it can forgery the multi-signature for any other message. Then, a more efficient certificateless sequential multi-signature scheme is construced which has lower computation cost and communication cost for using less bilinear pairings and only generating one signature message. Finally, the security proof shows that the proposed scheme can resist the forgery attack under the model of random oracle.
出处 《通信学报》 EI CSCD 北大核心 2014年第11期126-131,共6页 Journal on Communications
基金 国家自然科学基金资助项目(61202407 61173188) 中央高校基本科研业务费专项基金资助项目(WK01100s00033) 安徽省高校优秀青年人才基金资助项目(2012SQRL015) 安徽省高校自然科学研究重点基金资助项目(KJ2013A017)~~
关键词 无证书 多重签名 安全性分析 伪造攻击 certificateless multi-signature security analysis forgery attack
  • 相关文献

参考文献17

  • 1ITAKURA K, NAKAMURA K. A public-key cryptosystem suitable for digital multisignatures[J]. NEC Research & Development, 1983, 71:1-8.
  • 2HARDJONO T, ZHENG Y. A practical digital multisignature scheme based on discrete logarithms[A]. Advances in Cryptology-AUSCRYP'g92, LNCS718[C]. Berlin, Springer-Verlag, 1992. 122-132.
  • 3MICALI S, OHTA K, REYZIN L. Accountable-Subgroup multisigna- tures[A]. Pmc of the 8th ACM Conf on Computer and Communica- tions Security[C]. 2001.245-254.
  • 4于佳,郝蓉,孔凡玉,程相国,GUO Xiang-Fa.标准模型下的前向安全多重签名:安全性模型和构造[J].软件学报,2010,21(11):2920-2932. 被引量:13
  • 5HARN L, REN J. Efficient identity-based RSA multisignatures[J]. Computers & Security, 2010, 27(3): 12-15.
  • 6LU S, OSTROVSKY R, SAHAI A, et al. Sequential aggregate signa- tures, muhisignatures, and verifiably encrypted signatures without random oracles[J]. Journal of Cryptology, 2013, 26(2):340-373.
  • 7AL-RIYAMI S S, PATERSON K G. Cenificateless public key cryp- tography[A]. Proc of Asiacrypt 2003[C]. Springer-Verlag, Berlin, 2003.452-473.
  • 8JIN Z P, WEN Q Y. Certificateless multi-proxy signature[J]. Computer Communications, 2011, 34(3): 344-352.
  • 9TIAN M M, HUANG L S. Cryptanalysis of a certificateless signature scheme without pairings[J]. International Journal of Communication Systems, 2013, 26(11): 1375-1381.
  • 10TIAN M M, YANG W, HUANG L S. Cryptanalysis and improvement of a certificateless multi-proxy signature scheme[J]. Fundamenta ln- formaticae, 2014, 129(4): 365-375.

二级参考文献16

  • 1王晓明,符方伟,张震.前向安全的多重数字签名方案[J].计算机学报,2004,27(9):1177-1181. 被引量:22
  • 2HARN L, and REN J. Efficient identity-based RSA multisignatures[J]. Computers & Security, 2010, 27(3): 12-15.
  • 3WANG B, YANG X D, YANG G. An identity-based multisignaturc scheme from the weil pairing[A]. Proceedings of the 2010 Interna- tional Conference on Computer Design And Applications (ICCDA 2010)[C]. Qinhuangdao, China, 2010.
  • 4ISLAM S H, BISWAS G P. Certificateless strong designated verifier multisignature scheme using bilinear pairings[A]. Proceedings of the International Conference on Advances in Computing, Communica- tions and Informatics[C]. Chennai, India, 2012.
  • 5YANH A, TSD R, MAMBU M, et al. Certificateless ordered sequen- tial aggregate signature scheme[A]. 2011 Third Intemational Confer- ence on Intelligent Networking and Collaborative Systems[C]. Fu- kuoka, Japan, 2011.
  • 6ZHANG Z F, WONG DC S, XU J, et al. Certificateless public-key signature: security model and efficient constmction[A]_ACNS'06:Proceedings of 4th International Confea'ence on Applied Cryptography and Network Security[C].Berlin, Germany, 2006.
  • 7POINTEI-IEVAL D, STERN J.Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396.
  • 8王泽成,斯桃枝,李志斌.改进的带签名者意向的结构化多重签名方案[J].计算机应用,2008,28(1):71-73. 被引量:1
  • 9王晓峰,张璟,王尚平.多重数字签名方案及其安全性证明[J].计算机学报,2008,31(1):176-183. 被引量:22
  • 10张亚玲,张璟,王晓峰.一个高效的基于身份和RSA的紧致多重数字签名方案[J].电子与信息学报,2008,30(9):2246-2249. 被引量:10

共引文献24

同被引文献44

  • 1左黎明,陈兰兰,周庆.一种适用于分布式审批工作流的多重短签名方案[J].计算机应用研究,2020,37(2):521-525. 被引量:4
  • 2AL-RIYAMI S, PATERSON K G, Certifieateless public key cryptog- raphy[A]. Proceedings of ASIACRYPT 2003[C]. Springer-Verlag, 2003.452-473.
  • 3ITAKURA K, NAKAMURA K. A public-key cryptosystem suitable for digital multisignatures[J]. NEC Research and Development, 1983, (71):1-8.
  • 4BELLARE M, NEVEN G, Multi-signatures in the plain public-key model and a general forking lemma[A]. 13th ACM Conference on Computer and Communications Security (CCS'06)[C]. Alexandria, USA, 2006.
  • 5BAGHERZANDI A, CHEON J H, JARECKI S. Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma [A]. 15th ACM conference on Computer arid commu- nications security (CCS'08)[C]. Alexandria, USA, 2009.27-31.
  • 6MA C, WENG J, LI Y, et al. Efficient discrete logarithm based multi-signature scheme in the plain public key model [J]. Designs, Codes and Cryptography. 2010, 54(2): 121 - 133.
  • 7FAN Y K, LU H D, JIA Y, et al. Lattice-based multi-signature schemes [J]. Applied Mechanics and Materials, 2013, 411-414: 3-6.
  • 8BOLDREVA A, GENTRY C, NEILL A. Ordered multisignatures and ID-based sequential aggregate signatures with applications to secure routing[A]. Proe of the 14th ACM Conf on Computer and Communi- cations Security[C]. New York, USA, 2007. 276-285.
  • 9JIN Z P, WEN Q Y. Certiflcateless multi-proxy signature [J]. Com- puter Communications, 2011, 34(3): 344-352.
  • 10XU J, SUN H X, WEN Q Y, et aL Improved certificateless multi-proxy signature [J], The Journal of China Universities of Posts and Telecommunications, 2012,19(4):94-105.

引证文献7

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部