期刊文献+

高效的可证明安全的基于证书聚合签名方案 被引量:7

Efficient and provably-secure certificate-based aggregate signature scheme
下载PDF
导出
摘要 聚合签名主要适用于需要将不同用户对不同消息的签名聚合成一个单一签名的场合。针对已有的基于证书聚合签名方案效率不高的问题,利用双线对构造了一个高效的基于证书聚合签名方案。在随机预言模型中证明了方案在适应性选择消息和身份攻击下是存在性不可伪造的,其安全性归约为计算Diffie-Hellman(CDH)困难问题。分析表明该方案的对运算是常量,而且只需3次双线性对运算,因此运算效率较高。 Aggregate signature is useful in special areas where the signatures on many different messages generated by many different users need to be aggregated. Since the existing certificate-based aggregate signature schemes cannot achieve high efficiency, a efficient certificate-based aggregate signature scheme from bilinear pairing was proposed. Under the random oracle model, the scheme was proved to be existentially unforgeable against adaptive chosen message and identity attacks, and the security could be reduced to Computational Diffie-Hellman( CDH) assumption. The analysis shows that the scheme has constant pairing computations, and only requires three pairing computations, thus it is efficient.
出处 《计算机应用》 CSCD 北大核心 2014年第9期2664-2667,共4页 journal of Computer Applications
基金 天水师范学院科研项目(TSA1224)
关键词 聚合签名 基于证书签名体制 计算DIFFIE-HELLMAN问题 双线性对 随机预言模型 aggregate signature certificate-based cryptography Computational Diffie-Hellman(CDH) problem bilinear pairing Random Oracle Model(ROM)
  • 相关文献

参考文献6

二级参考文献37

  • 1Cheng Xiangguo,Liu Jingmei,Guo Lifeng,Wang Xinmei.IDENTITY-BASED MULTISIGNATURE AND AGGREGATE SIGNATURE SCHEMES FROM M-TORSION GROUPS[J].Journal of Electronics(China),2006,23(4):569-573. 被引量:11
  • 2Gentry C. Certificate-based Encryption and the Certificate Revocation Problem[J].Lecture Notes in Computer Science, 2003, 2656:272-293.
  • 3Kang B G, Park J H, Hahn S G. A Certificate-based Signature Scheme[J]. Lecture Notes in Computer Science, 2004,2964:99 -111.
  • 4Boneh D,Gentry C, Lynn B, et al. Aggregate and Verifiably En crypted Signatures from Bilinear Maps[C]//Proceedings of Eurocrypt'03. Berlin: Springer Verlag, 2003 : 416-432.
  • 5Liu J K, Baek J, Zhou J. Certificate-based Sequential Aggregate Signature[C]//Proceedings of WiSec' 09. New York: ACM, 2009 : 21-28.
  • 6王晓峰,张璟,王尚平,张亚玲,秦波.新的基于身份的广义指定验证者签名方案[J].电子学报,2007,35(8):1432-1436. 被引量:9
  • 7Gentry C. Certificate-based encryption and the certificaterevocation problem[ C]//Proc of Eurocrypt,03. Berlin:Springer-Verlag, 2003 : 272-293.
  • 8Girault M. Self-certified public keys [ C ]//Poc ofEurocrypt,91. Berlin: Springer-Verlag, 1991 : 490-497.
  • 9Kang B G, Park J H, Hahn S G. A certificate-basedsignature scheme [ C ] //Proc of CT-RSA 2004. Berlin :Springer-Verlag, 2004 : 99-111.
  • 10Li J, Huang X,Mu Y,et al. Certificate-basedsignature : security model and efficient construction[C ]//EuroPKI,07. Berlin: Springer-V erlag, 2007;110-125.

共引文献37

同被引文献47

  • 1Gentry C. Certificate-based encryption and the certificate revocation problem [A]. Biham E., ed. In: Eurocrypt 2003, LNCS: 2656 [C]. Berlin: Springer-Verlag, 2003:272-293.
  • 2Gutmann P. PKI: It's not dead, just resting [J]. IEEE Computer, 2002, 35(8): 41-49.
  • 3Shamir A. Identity-based cryptosystems and signature schemes [A]. Blakely, G.R., Chaum, D, ed. In: CRYPTO'84. LNCS:196 [C]. Berlin: Springer-Verlag, 1984: 47-53.
  • 4AI-Riyami S, Paterson K. Certificateless public key cryptography [A]. Lee PJ., ed. In: ASIACRYPT "03. LNCS: 2894 [C]. Bedim Springer-Verlag, 2003:452-473.
  • 5Wu W, Mu Y, Susilo W, et al. Certificate-Based signatures revisited [J]. Journal of Universal Computer Science, 2009, 15(8): 1659-1684.
  • 6Man H, Liu J, Susilo W, et al. Certificate based (linkable) ring signature [A]. E. Dawson and D.S. Wong (Eds.). In: ISPEC 2007, LNCS 4464 [C]. Berlin: Springer-Verlag, 2007: 79-92.
  • 7Li J, Zhang Y, Teng H. A forward-secure certificate-based signature scheme in the standard model [A]. Y. Xiang, Lopez,Javier, Kuo, C. -C Jay (Eds.).In: CSS 2012, LNCS 7672 [C]. Berlin: Springer-Verlag, 2012:362-376.
  • 8Li J, Huang X, Zhang Y, et al. An efficient short certificate-based signature scheme [J]. The Journal of Systems and Software, 2012(85): 314-322.
  • 9Li J, Xu L, Zhang Y. Provably secure certificate-based proxy signature schemes [J]. Journal of Computers, 2009, 4(6): 444-452.
  • 10Wang S H, Chang S Q. Construetion of lightweight certificate-based signature and application in cloud computing [A]. L.Sun,H.Ma, and F. Hong (Eds.).In: CWSN 2013, CCIS 418 [C]. Bedim Springer-Verlag, 2013: 61-70.

引证文献7

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部