期刊文献+

改进的基于身份无可信中心的代理签名 被引量:2

Improved ID-based proxy signature without a trusted party
在线阅读 下载PDF
导出
摘要 根据基于身份无可信中心签名的性质,证明了已有的基于身份无可信中心的代理签名方案是不安全的,不能抵抗PKG的伪造攻击.不诚实的PKG可以伪造用户的授权签名和代理密钥,用伪造的授权签名生成消息的代理签名.对原有方案加以改进,提出了一种新的能够抵抗PKG伪造攻击的签名方案.分析表明,该方案不仅能满足代理签名所要求的所有性质,而且其效率也优于已有方案. The proposed ID based proxy signature without trusted party is proved insecure by using the property of ID-based signature scheme without trusted PKG, it can not resist forgery attack. A dishonest PKG can forge a warrant signature and proxy signing key, then the PKG can successfully counterfeit original signer, and make the proxy signer to sign message for him. By improving the original scheme, a new scheme is proposed, which can withstand the forgery attack of untrusting PKG. The testing results show that our new proxy signature scheme is more efficient.
作者 樊睿 王彩芬
出处 《西北师范大学学报(自然科学版)》 CAS 2008年第2期40-43,56,共5页 Journal of Northwest Normal University(Natural Science)
基金 甘肃省自然科学基金资助项目(3ZS051-A25-042) 甘肃省科技攻关项目(2GS064-A52-035-03) 西北师范大学学生学术科研资助金资助项目
关键词 代理签名 基于身份 不可信PKG BDH问题 proxy signature ID-based untrusting PKG bilinear Diffie-Hellman problem
  • 相关文献

参考文献9

  • 1SHAMIR A.Identity-based cryptosystems and signature schemes[M]//BLAKLE G R,CHAUM D.Advances in Cryptology:CRYPTO '84,Berlin:Springer,1984:7-53.
  • 2BONEH D,FRANKLIN M.Identity-based encryption from the Weil pairing[M]//KILIAN J.Advances in Cryptology:CRYPTO 2001,Berlin:Springer,2001:213-229.
  • 3BONEH D,BOYEN X.Secure identity based encryption without random oracles[M]//Advances in Cryptology:CRYPTO 2004,Berlin:Springer,2004:443-459.
  • 4LIAO Jian,XIAO Jun-fang,QI Ying-Hao,et al.ID-Based signature scheme without trusted PKG[M]//Advances in CISC 2005.Berlin:Springer,2005:53-62.
  • 5MAMBO M,USUDA K,OKAMOTO E.Proxy signatures for delegating signing operation[M]//Advances in 3rd ACM Conference on Computer and Communications Security(CCS '96).New York:ACM Press,1996:48-57.
  • 6XU Jing,ZHANG Zheng-feng,FENG Deng-guo.ID-Based proxy signature using bilinear pairings[M]//CHEN G.Advances in Parallel and Distributed Processing and Applications:ISPA 2005 Workshops.Berlin:Springer,2005:359-367.
  • 7ZHANG Fang-guo,KIM K.Efficient ID-based blind signature and proxy signature from bilinear pairings[M]//Advances in ACISP 2003.Berlin:Springer,2003:312-323.
  • 8张学军,王育民.基于身份无可信中心的盲签名和代理签名[J].计算机应用,2006,26(10):2307-2309. 被引量:7
  • 9BONEH D,LYNN B,SHACHAM H.Short signature from the Weil pairing[M]//BOYD C.Advances in Cryptology:Asiacrypt 2001.Berlin:Springer,2001:514-532.

二级参考文献7

  • 1SHAMIR A.Identity-based cryptosystems and signature schemes[A].Advances in Cryptology:Crypto'84[C].LNCS 196,Berlin,1984.47-53.
  • 2BONEH D,FRANKLIN M.Identity-based encryption from the weil pairing[A].Advances in Cryptology[C].Crypto 2001,LNCS 2139,2001.213-229.
  • 3BONEH D,LYNN B,SHACHAM H.Short signature from the weil pairing[A].Advances in Cryptology[C].LNCS 2248,Asiacrypt 2001,2001.514-532.
  • 4ZHANG F,KIM K.ID-based blind signature and ring signature from pairings[A].Asiacrpt 2002,LNCS 2501[C].2002.533 -547.
  • 5ZHANG F,KIM K.Efficient ID-based blind signature and proxy signature from bilinear pairings[A].ACISP 2003,LNCS 2727[C].2003.312-323.
  • 6HUANG ZJ,CHEN KF,WANG YM.Efficient identity-based signatures and blind signatures[A].CANS 2005,LNCS 3810[C].2005.120-133.
  • 7CHEN XF,ZHANG FG,KIM K.A new ID-based group signature scheme from bilinear pairings[EB/OL].http://eprint.iacr.org/2003/116.pdf,2006.

共引文献6

同被引文献31

  • 1向新银,王晓峰,王尚平,林婷婷,王娟.新的基于身份的强指定验证者代理签名方案[J].计算机工程与应用,2007,43(1):130-131. 被引量:4
  • 2张学军,王育民.新的基于身份无可信中心的盲签名和代理签名[J].计算机工程与应用,2007,43(1):142-144. 被引量:12
  • 3MAMBO M, USUDA K, OKAMOTO E. Proxy signature: Delegation of the power to sign messages [ J]. IEICE Transactions Fundamentals, 1996, E79-A(9) : 1338 - 1353.
  • 4ZHANG K. Non-repudiable proxy signature schemes [ M]. [ S. l.] : Manuscript, 1997.
  • 5ZHANG K. Threshold Proxy signature schemes [ C]//Proceeding of the 1997 Information Seeurity Workshop. Ishikawa, Berlin: Springer-Verlag, 1998:191-197.
  • 6SUN H M, LEE N Y, HWANG T. Threshold proxy signature seherues [ J]. IEE Proc Computers & Digital Techniques, 1999, 146(5), 259 - 263.
  • 7KIM S, PARK S, WON D. Proxy signatures revisited [C]// Proceedings of the First International Conference on Information and Communication Seeurity, LNCS 1334. Berlin: Spdnger-Verlag, 1997:223-232.
  • 8SUN H M. An efficient nonrepudiable threshold proxy signature scheme with known signers[ J]. Computer Communications, 1999, 22(8) : 717 - 722.
  • 9SUN H M, CHEN B J. Time-stamped proxy signatures with traceable receivers [ C]//Proceedings of the Ninth National Conference on Information Security. Taipei, Taiwan: [ s. n: ], 1999:247 - 253.
  • 10XU JING, ZHANG ZHEN-FENG, FENG DENG-GUO. ID-based proxy signature using bilinear pairings [ C]// International Workshop on Information Assurance in Distributed Systems, LNCS 3759. Berlin: Springer-Verlag, 2005:359-367.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部