期刊文献+

一个改进的基于身份具有消息恢复功能代理签名方案 被引量:1

An improved ID-based proxy signature scheme with message recovery
下载PDF
导出
摘要 在具有消息恢复功能签名方案中,原始信息被包含在签名中,其不需要发送给验证者,因此降低了签名的长度。Singh和Verma提出了一个具有消息恢复功能的基于身份的代理签名方案,Niu等人指出了其方案是不安全的,然后给出了一个改进方案,并宣称改进方案是安全的。然而通过对Niu等人给出方案的分析,发现其方案依然是不安全的,当攻击者获得一个有效签名时,他可以对任何一个消息进行伪造签名。为了解决该方案的安全缺陷,对其方案进行了改进,改进的方案可以有效抵抗伪造攻击。与之前的方案相比,效率更高。 A digital signature scheme with message recovery is a signature scheme in which the original message of the signature is not required to be transmitted together with the signature,so it can reduce the length of the signature. Singh and Verma proposes a new ID-based proxy signature scheme with message recovery. Niu et al. pointed out the scheme was unsafe,and proposed an improved scheme, and announced the improved scheme is safe. The scheme was found insecure through the analysis,the attacker can give a forgery signature when he gets a valid signature. In order to overcome the weakness of the scheme,an improved scheme was proposed,which can resist the forgery attack. Compared with the previous schemes,the improved scheme is more efficient.
出处 《贵州师范大学学报(自然科学版)》 CAS 2016年第6期98-103,共6页 Journal of Guizhou Normal University:Natural Sciences
基金 国家自然科学基金项目(61562012) 贵州省教育厅创新群体重大研究项目(黔教合KY字2016[026])
关键词 基于身份密码 代理签名 消息恢复 伪造攻击 安全性 ID-based cryptography proxy signature message recovery forgery attack security
  • 相关文献

参考文献3

二级参考文献24

  • 1LIJi-guo ZHANGYi-chen ZHUYue-long.A New Proxy Signature Scheme with Message Recovery Using Self-Certified Public Key[J].Wuhan University Journal of Natural Sciences,2005,10(1):219-222. 被引量:3
  • 2陈辉焱,吕述望,刘振华.基于身份的具有部分消息恢复功能的签名方案[J].计算机学报,2006,29(9):1622-1627. 被引量:8
  • 3NYBERG K, RUEPPEL R A. A new signature scheme based on the DSA giving message recovery[ C]//Proc of the 1st ACM Conference on Computer and Communications Security, New York: ACM, 1993: 58-61.
  • 4BONEH D, LYNN B, SHACHAM H. Short signatures from the weil pairing[ C] //Advances in Cryptology-Asiaerypt' 01, Berlin : Springer-Verlag, 2001 : 514-532.
  • 5ZHANG F G, SUSILO W, MU Y. Identity-based partial message recovery signatures (or How to shorten Id-based signatures) [ C ]// Financial Cryptography and Data Security 2005. Berlin: Springer-Verlag, 2005 : 45-56.
  • 6LI Y, CHEN H Y. Efficient identity-based signature scheme with partial message recovery[ C ]//8th Intern. Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/ Distributed Computing, Washington: IEEE Computer Society, 2007 : 883-888.
  • 7CANETTI R, GOLDREICH O, HALEVI S. The random oracle methodology, revisited[J~. Journal of the ACM, 2004, 51 (4) : 557-594.
  • 8PATERSON K G, SCHULDT J C. Efficient identity based signatures secure in the standard model[ C] // Proc of the l lth Australasian Conference Infor mation Security and Privacy 2006. Berlin: Springer-Verlag, 2006: 207-222.
  • 9GENTRY C. Practical identity-based encryption without random oracles [ C ] //Advances in Cryptology-Eurocrypt 2006. Berlin: Springer-Verlag, 2006 : 445-464.
  • 10REN Y L, GU D W. Efficient identity based signature /signcryption scheme in the standard model[ C ]// Proc of the 1st International Symposium Data, Privacy, and E-Commerce ( ISDPE 2007). Washington: IEEE Computer Society, 2007 : 133- 137.

共引文献4

同被引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部