期刊文献+

改进的基于证书的聚合代理签名方案 被引量:4

Improved certificate-based aggregate proxy signature scheme
下载PDF
导出
摘要 针对喻琇瑛等(喻琇瑛,何大可.基于双线性对的聚合代理签名.中南大学学报(自然科学版),2015,46(12):4535-4541.)提出的聚合代理签名方案进行分析,指出该方案存在已知一个有效签名的情况下可伪造任意消息的有效签名漏洞,在此基础上提出了一个改进的基于证书的聚合代理签名方案,给出了一种新的攻击模型,并在随机预言机模型下证明了新方案针对新的攻击者是存在性不可伪造的。改进后的新方案能够抵抗合谋攻击和伪造签名攻击,适用于计算受限以及实时要求高的应用场合。 The analysis of aggregate proxy signature scheme proposed by Yu et al. (YU X Y, HE D K. A certificate-based aggregate proxy signature scheme. Journal of Central South University (Science and Technology), 2015, 46(12): 4535-4541.) showed that a valid signatures could be forged for any messages while knowing a valid signature. Therefore, an improved certificate-based aggregate proxy signature scheme was proposed and a new attack model was given. The new scheme was proved to be existentially unforgeable for the new attacker in random oracle model. The results show that the proposed scheme can resist conspiracy attacks and forgery attacks, and it is more suitable for the computation-constrained and real-time tasks.
出处 《计算机应用》 CSCD 北大核心 2016年第10期2758-2761,2766,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(11361024 11261019) 江西省自然科学基金资助项目(20151BAB201002)~~
关键词 基于证书 聚合代理签名 随机预言机 计算Diffie-Hellman难题 存在性不可伪造 certificate-based aggregate proxy signature random oracle model Computational Diffie-Hellman (CDH)problem existentially unforgeable
  • 相关文献

参考文献12

  • 1BONEH D, GENTRY C, LYNN B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[ C]// Proceedings of EU- ROCRYPT 2003 on Advances in Cryptology. Berlin: Springer, 2003:416-432.
  • 2MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delega- ting signing operation[ C] // Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York: ACM, 1995:48 - 57.
  • 3BOLDYREVA A, PALACIO A, WARINSCHI B. Secure proxy sig- nature schemes for delegation of signing rights[ J]. Journal of Cryp- tology, 2012, 25(1): 57-115.
  • 4GENTRY C. Certificate-based encryption and the certificate revoca- tion problem[ C] // Proceedings of EUROCRYPT 2003: Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2003:272-293.
  • 5LI J, KIM K, ZHANG F, et al. Aggregate proxy signature and veri- fiably encrypted proxy signature[ C]/! Proceedings of the First Inter- national Conference on Provable Security, LNCS 4784. Berlin: Springer, 2007:208-217.
  • 6ZHANG J. On the security of a certificate-based signature scheme and its improvement with pairings[ C]// ISPEC 2009: Proceedings of the 5th Intemationa| Conference on Information Security Practice and Experience, LNCS 5451. Berlin: Springer, 2009:47-58.
  • 7KYUNG A H S. An ID-based aggregate signature scheme with con- stant pairing computations[ J]. Journal of Systems and Software, 2010, 83(10): 1873-1880.
  • 8陈建能,岳昊,黄振杰.一个可证安全的基于证书聚合签名方案[J].计算机工程与应用,2013,49(21):60-64. 被引量:12
  • 9陈群山,黄振杰,郝艳华,黄茹芬.基于身份的代理聚合签名方案的分析与改进[J].济南大学学报(自然科学版),2014,28(3):204-208. 被引量:4
  • 10LIN Y, WU Z, CAI J. ID-based aggregate proxy signature scheme realizing warrant-based delegation[ J]. Journal of Information Sci- ence and Engineering, 2013, 29(3): 441-457.

二级参考文献35

  • 1Cheng Xiangguo,Liu Jingmei,Guo Lifeng,Wang Xinmei.IDENTITY-BASED MULTISIGNATURE AND AGGREGATE SIGNATURE SCHEMES FROM M-TORSION GROUPS[J].Journal of Electronics(China),2006,23(4):569-573. 被引量:11
  • 2MAMBO M,USUDA K,OKAMOTO E.Proxy signature:delegation of the power to sign messages [ J ].IEICE Trans Fundamentals,1996,E79-A(9):1338-1353.
  • 3ZHANG F,KIM K.Efficient ID-based blind signature and proxy signature from bilinear pairings[ C ]//Proceedings of ACSIP 2003,LNCS 2727.Berlin:Springer-Verlag,2003:312-323.
  • 4LI X,CHEN K,SUN L.Certificatetess signature and proxy signa-ture schemes from bilinear pairings [ J ].Lithuanian Mathematical Journal,2005,45(1):76-83.
  • 5LU R,HE D,WANG C J.Cryptanalysis and improvement of a cer-tificateless proxy signature scheme from bilinear pairings [ C ]//Proceedings of SNPD,2007,vol 3.Qingdao:IEEE,2007:285-290.
  • 6LI J,XU L,ZHANG Y.Provably secure certificate-based proxy sig-nature schemes [ J ].Journal of Computers,2009,4(6):444-452.
  • 7BONEH D,GENTRY C,LYNN B,et al.Aggregate and verifiably encrypted signatures from bilinear maps [ C ]//EUROCRYPT03,LNCS 3027.Berlin:Springer-Verlag,2003:416-432.
  • 8CHEON J K,KIM Y,YOON H J.A new ID-based signature with batch verification [ OL ].[ 2013-08-16 ].http://eprint.iacr.org/2004/131.
  • 9GONG Z,LONG Y,HONG X,et al.Two eertifieateless aggregate signatures from bilinear maps [ C ]//Proceedings of SNPD 2007,vol 3.Qingdao:IEEE,2007:188-193.
  • 10LIU J K,BAEK J,ZHOU J.Certificate-based sequential aggregate signature [ C ]//Proceeding of Wisec'09.New York:ACM,2009:21-28.

共引文献19

同被引文献19

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部