期刊文献+

无随机预言模型下可否认的基于属性的指定证实人签名方案

Deniable Attribute-based Designated Confirmer Signature without Random Oracles
下载PDF
导出
摘要 首次在无随机预言模型下构建了可否认的基于属性的指定证实人签名方案。在该方案中,签名者和指定的证实人均可通过执行相同的协议来对签名的有效性进行确认,同时可以通过执行相同的协议来否认无效的签名。最后,对方案的正确性进行了分析,并在无随机预言模型下证明了方案的安全性。分析表明,本方案具有不可伪造性和隐形性。 In this paper, we first proposed a deniable attribute-based designated confirmer signature's model without random oracles. In this signature scheme, both the signer and the designated confirmer can run the same protocols to confirm a valid designated confirmer signature or disavow an invalid signature. Finally, the proof of correctness and security in the standard model is provided. Analyticdt results show that this scheme obtains the advantages of uniorgeability and invisibility.
作者 任燕
出处 《计算机科学》 CSCD 北大核心 2016年第7期162-165,共4页 Computer Science
基金 国家自然科学基金(11241005) 运城学院生物数学重点实验室开放课题(SWSX201306)资助
关键词 数字签名 基于属性签名 指定证实人签名 无随机预言模型 可否认 Digital signature,Attribute-based signature,Designated confirmer signature,Random oracles,Deniable
  • 相关文献

参考文献1

二级参考文献22

  • 1SAHAI A, WATERS B. Fuzzy identity-based encryption [ C ]//Proc of Advances in Cryptology-Eurocrypt. Aarhus: Springer-Verlag Press, 2005 : 457-473.
  • 2BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attrib- ute-based encryption [ C ]//Proc of the 28th IEEE Symposium on Se- curity and Privacy. 2007 : 321-334.
  • 3CHEUNG L, NEWPORT C. Provably secure ciphertext policy ABE [ C]//Proc of the 14th ACM Conference on Computer and Communi- cations Security. New York: ACM Press, 2007: 456-465.
  • 4PIRRETrI M,TRAYNOR P, McDANIEL P,et al. Secure attribute- based systems[ C ]//Proc of the 13th ACM Conference on Computer and Communications Security. 2006 : 99-112,.
  • 5OSTROVSKY R, SAHAI A, WATERS B. Attribute-based encryption with nonmonotonic access structures [ C ]//Proc of the 14th ACM Con- ference on Computer and Communications Security. NewYork: ACM Press, 2007: 195-203.
  • 6YANG Pi-yi,CAO Zhen-fu,DONG Xiao-lei. Fuzzy identity based sig-nature, Report 2008/002 [ R ]. Shanghai : Shanghai Jiao Tong Univer- sing, 2007.
  • 7LI Jin, AU Man-ho, SUSILO W, et al. Attrlbute-based signature and its applications[ C]//Proc of the 5th ACM Symposium on Informa- tion, Computer and Communications Security. New York : ACM Press, 2010 : 60-69.
  • 8ESCALA A, HERRANZ J, MORILLO P. Revocable attribute-based signatures with adaptive security in the standard model[ C ]//Proc of the 4th International Conference on Progress in Cryptolngy-Afri- cacrypt. Berlin : Springer-Verlag , 2011 : 224-241.
  • 9OKAMOTO T, TAKASHIMA K. Efficient attribute-based signatures for nonmonotone predicates in the standard model [ C ]//Proc of the 14th International Confernce on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography. Berlin : Spring- er-Verlag,2011 : 35-52.
  • 10CHAUM D. Zero-knowledge undeniable signature[ C]// Proc of Eu- rocrypto. Berlin : Springer-Verlag, 1991:458-464.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部