期刊文献+

Forking引理与一类基于身份签名体制的安全性证明(英文) 被引量:4

Forking Lemma and the Security Proofs for a Class of ID-Based Signatures
在线阅读 下载PDF
导出
摘要 在随机谕示模型下,研究一类基于身份的签名体制(称为基于身份的一般签名体制)的安全性.所得理论成果可以被看作Pointcheval和Stern提出的Forking引理在基于身份签名体制研究领域的扩展,有助于理解和简化一些现有的基于身份签名体制的安全性证明,如Cha-Cheon的体制、Hess的体制1及Cheon-Kim-Yoon的体制等. This paper offers arguments for the provable security of a class of ID-based signature schemes called ID-based generic signature schemes in the random oracle model. The theoretical result can be viewed as an extension of the Forking Lemma due to Pointcheval and Stern for ID-based signature schemes, and can help to understand and simplify the security proofs of previous work such as Cha-Cheon's scheme, Hess's scheme-l, Cheon-Kim-Yoon's scheme, and so on.
出处 《软件学报》 EI CSCD 北大核心 2007年第4期1007-1014,共8页 Journal of Software
基金 SupportedbytheNationalNaturalScienceFoundationofChinaunderGrantNos.90204015,60473021(国家自然科学基金) theNationalGrandFundamentalResearch973ProgramofChinaunderGrantNo.G1999035804(国家重点基础研究发展规划(973))
关键词 基于身份的签名 Forking引理 可证安全 存在性伪造 ID-based signature Forking lemma provable security existential forgery
  • 相关文献

参考文献11

  • 1Shamir A.Identity-Based cryptosystems and signature schemes.In:Advances in Cryptology-CRYPTO'84.LNCS 196,Berlin,Heidelberg,New York:Springer-Verlag,1984.47-53.
  • 2Boneh D,Franklin M.Identity-Based encryption from the Weil pairing.In:Kilian J,eds.Advances in Cryptology-CRYPTO 2001.LNCS 2139,Berlin,Heidelberg,New York:Springer-Verlag,2001.213-229.
  • 3Cha JC,Cheon JH.An identity-based signature from gap Diffie-Hellman groups.In:Public Key Cryptography-PKC 2003.LNCS 2567,Berlin,Heidelberg,New York:Springer-Verlag,2003.18-30.
  • 4Hess,F.Efficient identity based signature schemes based on pairings.In:Selected Areas in Cryptography the 9th Annual Int'l Workshop,SAC 2002.LNCS 2595,Berlin,Heidelberg,New York:Springer-Verlag,2003.310-324.
  • 5Yoon HJ,Cheon JH,Kim Y.Batch verifications with ID-based signatures.In:Information Security and Cryptology-ICISC 2004.LNCS 3506,Berlin,Heidelberg,New York:Springer-Verlag,2005.233-248.
  • 6Paterson KG.ID-Based signatures from pairings on elliptic curves.Electronics Letters,2002,38(18):1025-1026.http://eprint.iacr /org/2002/004
  • 7Goldwasser S,Micali S,Rivest R.A digital signature scheme secure against adaptive chosen message attacks.SIAM Journal of Computing,1988,17(2):281-308.
  • 8Bellare M,Rogaway P.Random oracles are practical:A paradigm for designing efficient protocols.In:Proc.of the 1st CCCS.New York:ACM Press,1993.62-73.
  • 9Canetti R,Goldreich O,Halevi S.The random oracle methodology,revisited.In:Proc.of the STOC'98.ACM Press,1998.209-218.
  • 10Pointcheval D,Stern J.Security arguments for digital signatures and blind signatures.Journal of Cryptology,2000,13(3):361-369.

同被引文献37

引证文献4

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部