期刊文献+

基于SM2的可截取签名方案

SM2-based Content Extraction Signature Scheme
下载PDF
导出
摘要 数字签名是公钥密码体制的重要应用部分,可截取数字签名解决了签名的持有者在不与原始签名人交互的情况下,根据自身要求就可以对已签名的数据进行合理的截取操作.将SM2数字签名算法与可截取签名算法相结合,提出一种新的基于椭圆曲线离散对数的可截取签名方案.并在随机预言机模型下对该方案的安全性进行分析,该方案满足不可伪造性、隐私性以及可审计性,即使是不诚实的截取者也无法对签名结果进行抵赖.性能分析表明,该方案通过标量乘法使算法效率得到提升. Digital signature is an important application part of public key cryptosystem.Content extraction signatures can solve the problem that the signature holder can intercept the signed data reasonably according to their own needs without interacting with the original signer.Combining SM2 digital signature algorithm with content extraction signatures algorithm,a new content extraction signature scheme based on discrete logarithm of elliptic curve is proposed.The security of the scheme is analyzed under the stochastic predictive machine model.The scheme satisfies the unforgerability,privacy and auditability,and even the dishonest interceptor cannot deny the signature result.Performance analysis shows that the algorithm efficiency is improved by scalar multiplication.
作者 任莹莹 胡江红 李妮 武特景 REN Yingying;HU Jianghong;LI Ni;WU Tejing(School of Mathematics and Information Science,Baoji University of Arts and Sciences,Baoji 721000,Shaanxi China)
出处 《河南科学》 2024年第2期195-201,共7页 Henan Science
基金 陕西省科技厅项目(2021JM-514) 宝鸡文理学院教学改革研究重点项目(23JGZD10)。
关键词 SM2数字签名算法 可截取签名 可审计性 随机预言机模型 SM2 digital signature algorithm content extraction signatures auditability random oracle model
  • 相关文献

参考文献15

二级参考文献65

  • 1刘军龙,王彩芬.基于身份的可截取门限签名方案[J].计算机应用,2006,26(8):1817-1820. 被引量:7
  • 2Steinfeld R, Bull L, Zheng Yuliang. Content Extraction Signatures[C] //Proceedings of the 4th International Conference on Information Security and Cryptology. Berlin, Germany: Springer- Verlag, 2001: 285-304.
  • 3Bull L, Stanskip P. Content Extraction Signature Using XML Digital Signatures and Custom Transforms On-demand[C] // Proceedings of the 12th International World Wide Web Conference. New York, USA: ACM Press, 2003: 170-177.
  • 4Bull L, Squire M D, Zheng Yuliang. A Hierarchical Extraction Policy for Content Extraction Signatures[J]. International Journal of Digital Libraries, 2004, 4(3): 208-222.
  • 5Rafael C, Ricardo D. Two Notes on the Security of Certificateless Signature[M]. Berlin, Germany: Springer-Verlag, 2007.
  • 6STEINFELD R,BULL L,ZHENG Y.Content extraction signatures[A].Proceedings of 4th international conference on information security and cryptology(ICISC 2001)[C].Berlin:Springer-Verlag,2001.285 -304.
  • 7BULL L,STANSKI P,MCG SQUIRE D.Content extraction signatures using XML digital signatures and custom transforms on-demand[A].Proceedings of the 12th international World Wide Web conference(WWW2003)[C].New York:ACM Press,2003.170 -177.
  • 8BULL L,MCG SQUIRE D,ZHENG Y.A Hierarchical Extraction Policy for content extraction signatures[J].International Journal on Digital Libraries,2004,4(3):208-222.
  • 9SHAMIR A.Identity-based cryptosystems and signature schemes[A].Advances in Cryptography-CRYPTO'84[C].Berlin:Springer -Verlag,1984,Vol 196:47-53.
  • 10BONEH D,FRANKLIN M.Identity based Encryption from Weil pairing[A].Advances in Cryptography-CRYPT0 2001,LNCS2139[C].Berlin:Springer-Verlag,2001.213 -229.

共引文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部