期刊文献+

高效可证明安全的基于证书的代理环签名方案 被引量:2

An efficient and provably secure certificate-based proxy ring signature scheme
下载PDF
导出
摘要 将密钥生成中心(key generating center,KGC)为用户生成的证书作为用户公钥的一部分,设计了一个基于证书的代理环签名方案.此方案安全性是基于计算Diffie-Hellman问题的,可有效地避免替换公钥攻击,与目前效率最高的可证明安全的无证书代理环签名方案相比,此方案的效率提高了50%.鉴于此方案的安全性和高效性,它可广泛应用于移动代理和电子政务等系统. In this paper,an efficient and provably secure certificate-based proxy ring signature scheme is proposed,in which the certificate generated by the KGC(Key Generating Centre)is considered as part of the user’s public key.The security analysis shows that the signature scheme is based on the computational Diffie-Hellman problem and it can effectively address the problem of public key replacement attack.Moreover,compared with the most efficient provably secure certificate free proxy ring signature scheme,the analysis shows that the efficiency of the proposed scheme is increased by 50%.In view of the security and efficiency of the proposed scheme,it can be applied to mobile agent systems and electronic government affairs,etc.
作者 吴晨煌 李慧敏 张金辉 WU Chen-huang;LI Hui-min;ZHANG Jin-hui(School of Mathematics and Finance,Putian University,Putian,Fujian 351100,China;Key Laboratory of Applied Mathematics,Fujian Province University,Putian,Fujian 351100,China)
出处 《宁德师范学院学报(自然科学版)》 2018年第1期15-22,共8页 Journal of Ningde Normal University(Natural Science)
基金 国家自然科学基金项目(61170246) 2016年福建省高校杰出青年科研人才培育计划 福建省自然科学基金项目(2015J01662) 莆田学院校内项目(2016096)
关键词 代理环签名方案 基于证书 双线性对 替换公钥攻击 无证书 proxy ring signature scheme certificate-based bilinear pair public key replacement attack certificate free
  • 相关文献

参考文献9

二级参考文献69

  • 1杨少春,郎为民.基于身份和双线性对的代理环签名方案[J].微计算机信息,2006,22(04X):79-81. 被引量:12
  • 2禹勇,杨波,李发根,张明武.一个有效的代理环签名方案[J].北京邮电大学学报,2007,30(3):23-26. 被引量:11
  • 3Rivestr, Shamir A, Tauman Y. How to leak a secret[A]. Proceeding Asiaerypt, LNCS 2248[C]. Berlin : Springer- Verlag, 2001 : 552 -565.
  • 4HERRANZ J, SAEZ G. New identity based ring signature[A]. LNCS3269[C]. Berlin: SpringerVerlag, 2004:27 -39.
  • 5Shacham H, Waters B. Efficient Ring Signatures Without Random Oracles [ A]. Advances in PKC2007, LNCS4450 [ C ]. Springer - Verlag, 2007 : 166 - 180.
  • 6Mambo M, Usuda K, Okamoto E.Proxy signatures for delegating signing operation[C]//Proc 3rd ACM Conference on Computer and Communications Security.New York: ACM Press, 1996: 48-57.
  • 7Rivest R L, Shamir A, Tauman Y.How to leak a secret[C]// LNCS 2248: Advances in Croptology-Asiacrypt 2001.New York: Springer-Verlag, 2001 : 552-565.
  • 8Zhang F, Naini R S, Lin C Y.New proxy signature, proxy blind signature and proxy ring signature scheme from bilinear pairings[C/ OL]//Cryptology ePrint Archive Report 2003/ll7.http://eprint.iacr. org/2003/104/.
  • 9Rivest R L, Shamir A, Tauman Y. How to Leak a Secret[C]//Proc. ofAsiaCrypt'01. Berlin, Germany: Springer-Verlag, 2001.
  • 10Mambo M, Usuda K, Okamoto E. Proxy Signatures for Delegating Signing Operation[C]//Proc. of the 3rd ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 1996.

共引文献12

同被引文献19

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部