期刊文献+

一个基于身份的代理签名的分析与改进 被引量:3

ANALYSIS AND IMPROVEMENT OF ID-BASED PROXY SIGNATURE SCHEME
下载PDF
导出
摘要 针对Wu等人提出的基于身份的代理签名方案进行分析,指出该方案不满足公开验证性和不可伪造性,提出一种改进的基于身份的代理签名方案。该方案基于双线性对运算和离散对数的困难性问题,满足代理签名的一般性安全要求。经过分析证明,并与现有的其他方案比较,该方案效率较高。 We analysed the ID-based proxy signature scheme presented by Wu et al.,and pointed out that it doesn't satisfy the public verifiability and un-forgeability. Therefore we proposed an improved ID-based proxy signature scheme. This one is based on bilinear pairings computation and difficulty of discrete logarithm problem,it satisfies the general safety requirements of proxy signature. It is proved by analysis and comparing with existing schemes that our scheme has higher efficiency.
出处 《计算机应用与软件》 CSCD 2016年第3期291-293,共3页 Computer Applications and Software
基金 国家自然科学基金面上项目(61272435)
关键词 基于身份 代理签名 公开验证性 不可伪造性 高效 ID-based Proxy signature Public verifiability Un-forgeability Efficient
  • 相关文献

参考文献15

  • 1Diffie W,Hellman M E.New directions in cryptography[J].Information Theory,IEEE Transactions on,1976,22(6):644-654.
  • 2Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126.
  • 3El Gamal T.A public key cryptosystem and a signature scheme based on discrete logarithms[C]//Advances in Cryptology.Springer Berlin Heidelberg,1985:10-18.
  • 4Rabin M O.Digital signature foundations of secure communication[M].New York:Aeademic Press,1978.
  • 5Shamir A.Identity-based cryptosystem and signature scheme[C]//Advances in Cryptology-Crypto 1984,LNCS 196,Heidelberg:Springverlag,1984:47-53.
  • 6任伟.数字签名[M].北京:国防工业出版社,2012.
  • 7Mambo M,Usuda U,Okamoto E.Proxy signatures for delegating signing operation[C]//Conference on Computer and Conmunications Seeurity,1996:48-57.
  • 8Kim S,Park S,Wond.Proxy signatures revisited[C]//Conference on Information and Communications Security,LNCS,Springer-Verlag,1997(1334):223-232.
  • 9Zhang K.Threshold proxy signature schemes[C]//Information Security Workshop,Japan,1997:191-197.
  • 10Kim K S,Hong D,Jeong I R.Identity-based proxy signature from lattices[J].Journal of communications and networks,2013:15(1):1-7.

二级参考文献21

  • 1Mambo M, Usuda K, Okamoto K. Proxy Signatures: Dele- gation of the Power to Sign Messages[J]. IEICE Transactions on Fundamentals, 1996, E79-A(9): 1338-1353.
  • 2Gentry C, Pei.kert C, Vaikuntanathan V. How to Use a Short Basis: Trapdoors for Hard Lattices and New Cryptographic Constructions[C]//Proc. of STOC'2008. New York, USA: [s. n.], 2008: 197-206.
  • 3Jiang Yali, Kong Fanyu, Ju Xiuling. Lattice-based Proxy Signature[C]//Proc. of 2010 International Conference on Computational Intelligence and Security. Nanning, China: Is. n.], 2010: 382-385.
  • 4Cash D, Hoflaeinz D, Kiltz E, et al. Bonsai Trees, or How to Delegate a Lattice Basis[C]//Proc. of Eurocrypt'10. Berlin, Germany: Springer, 2010: 523-552.
  • 5Wang Chunxiao, Qi Mingnan. Lattice-based Proxy Signature Scheme[J]. Journal of Information and Computational Science, 2011, 12(8): 2451-2458.
  • 6Agrawal S, Boneh D, Boyen X. Lattice Basis Delegation in Fixed Dimension and Shorter-ciphertext Hierarchical IBE[C]// Proc. of CRYPTO'10. Berlin, Germany: Springer, 2010: 98-115.
  • 7Micciancio D, Goldwasser S. Complexity of Lattice Problems: a Cryptographic Perspective[M]. Boston, USA: Kluwer Academic Publishers, 2002.
  • 8Micciancio D, Regev O. Worst-case to Average-case Reduc- tions Based on Gaussian Measures[J]. SIAM Journal on Computing, 2007, 37(1): 267-302.
  • 9Peikert C, Rosen A. Efficient Collision-resistant Hashing from Worst-case Assumptions on Cyclic Lattices[C]//Proc. of TCC'2006. New York, USA: [s. n.], 2006: 145-166.
  • 10Blaze M,Bleumer G,Strauss M.Divertible protocols and atomic proxy cryptography[C]//International Conference on the Theory and Application of Cryptographic Techniques.Berlin:Springer-Verlag,1998:127-144.

共引文献6

同被引文献15

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部