期刊文献+

可证安全的基于身份代理聚合签名方案 被引量:2

Provably secure identity-based proxy aggregate signature scheme
下载PDF
导出
摘要 对一个基于身份代理聚合签名方案进行了安全性分析,证明该方案的聚合签名不能抵抗伪造攻击。在此基础上,利用双线性技术构造了一个新的基于身份代理聚合签名方案,并且利用Diffie-Hellman困难问题,在随机预言模型下,证明了新方案是存在性不可伪造的.效率分析结果表明,新方案的验证等式需要3个对运算,比已有的代理聚合签名方案更安全更高效。 Through secure analysis of an identity-based proxy aggregate signature scheme, this paper proved the aggregate signature couldn't resist forgery attack. Based on the scheme, this paper proposed a new identity-based proxy aggregate signature scheme with the bilinear pairings,and proved the proposed scheme is secure against existential forgery attack under the computational Diffie-Hellman problem in the random oracle model. The new scheme only needs three pairing computation in the verification stage and is more efficient than the known schemes.
作者 胡江红
出处 《电子设计工程》 2016年第18期10-12,15,共4页 Electronic Design Engineering
基金 国家自然科学基金(61402015) 陕西省教育厅专项科研计划项目(15JK1022) 宝鸡市科技计划项目(14GYGG-4-2 15RKX-1-5-8) 宝鸡文理学院一般项目(YK1618)
关键词 代理聚合签名 基于身份签名 双线性对 Diffie-Hellman困难问题 proxy aggregate signature identity-based signature bilinear pairing Diffie-Hellman problem
  • 相关文献

参考文献15

  • 1Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing Operation[C]//Proceedings of the 3thACM Conference on Computer and Communications Security,ACM Press, 1996: 48-57.
  • 2Shamir A. Identity-based cryptosystems and signature schem-es[C]// Proceedings of Crypto 1984, LNCS 196, 1984:47-53.
  • 3Zhang F, Kim K. Efficient ID-based blind signature and proxy signature from bilinear pairings [C]// Proceedings of the 8th Au-stralasian Conference on Information Security and Privacy.LNCS 2727, 2003: 312-323.
  • 4Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]// Advances in Crypto 2001. LNCS 2139, 2001:213-229.
  • 5Xu J,Zhang Z,Feng D. ID-based aggregate signature from bil-inear pairings[C]// Proceedings of the 4th International Confe-rence on Cryptology and Network Security. Berlin: Springer -Verlag, 2005,3810:110-119.
  • 6Shim K A. An ID-Based aggregate signature scheme with con-stant pairing Computations[J].The Journal of Systems and Softw-are, 2010, 83(10):1873-1880.
  • 7杜红珍,黄梅娟,温巧燕.高效的可证明安全的无证书聚合签名方案[J].电子学报,2013,41(1):72-76. 被引量:38
  • 8李艳文,杨庚.基于身份聚合签名方案的安全性分析与改进[J].计算机工程与应用,2012,48(28):101-106. 被引量:4
  • 9文毅玲,马建峰,王超.一个新的基于身份的聚合签名方案[J].计算机科学,2011,38(6):54-57. 被引量:6
  • 10彭延国,彭长根,冯蕾,樊玫玫.一个基于证书的聚集签名方案[J].计算机科学,2011,38(12):57-60. 被引量:8

二级参考文献94

  • 1程相国,刘景美,王新梅.m-挠群上一种基于身份的聚合签名方案[J].西安电子科技大学学报,2005,32(3):427-431. 被引量:3
  • 2Cheng Xiangguo,Liu Jingmei,Guo Lifeng,Wang Xinmei.IDENTITY-BASED MULTISIGNATURE AND AGGREGATE SIGNATURE SCHEMES FROM M-TORSION GROUPS[J].Journal of Electronics(China),2006,23(4):569-573. 被引量:11
  • 3李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 4Boneh D, Lynn B, Shacham H. Short signatures from the Weil Pairing[J]. Journal of Cryptology,2004,17(4) :297-319.
  • 5Lysyanskaya A, Micali S, Reyzin L, et al. Sequential aggregate signatures from trapdoor permutations[C]//Advances in Cryptography-Eurocrypt 2004,3027 of LNCS. 2004 : 74-90.
  • 6Lu S, Ostrovsky R, Sahai A, et al. Sequential aggregate signa tures and muhisignatures without random oracles [C]//Ad vances in Cryptography-Eurocrypt 2006,4004 of LNCS. 2006 465-485.
  • 7Jung Hee Cheon,Yongdae Kim, Hyo Jin Yoon. A new ID-based aggregate signature with batch verifieation[OL], http://eprint. iacr. org/2004/131.
  • 8Pointcheval D, Stem J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13 (3) : 361-396.
  • 9Herranz J. Deterministic identity-based signatures for partial aggregation[J]. Computer Journal, 2006,49 (3) : 322-330.
  • 10Gentry C, Ramzan Z. Identity-based aggregate signatures[C]//Proceedings of PKC 2006,3958 of LNCS. 2006:257-273.

共引文献62

同被引文献17

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部