期刊文献+

高效的基于身份不可授权的强指定验证者签名 被引量:1

Efficient ID-based non-delegatable strong designated verifier signature
在线阅读 下载PDF
导出
摘要 针对目前指定验证者签名权可授权的问题,基于双线性对提出一种高效的基于身份不可授权的强指定验证者签名方案,采用密码学上安全性分析的方法,结果证明了新方案在保持了强指定验证者各种安全特性的条件下,其效率高于已有方案,更适合于在实际中应用。 Faced with the delegatable problem of some existing designated verifier signatures,based on bilinear pairings,a new efficient identity-based non-delegatable strong designated verifier signature is proposed.Security analysis in cryptography is carried out to analyze the efficiency of the proposed scheme.Results show that the proposed scheme's efficiency is better than that of some existing ones under the condition of keeping all kinds of the security characteristics of strong designated verifier signature,so it is more propitious to applications in society.
作者 张学军
出处 《计算机工程与应用》 CSCD 北大核心 2010年第13期28-30,共3页 Computer Engineering and Applications
基金 国家自然科学基金No.60573043 No.60773175~~
关键词 双线性对 基于身份 不可授权性 强指定验证者签名 bilinear parings identity-based non-delegatability strong designated verifier signature
  • 相关文献

参考文献11

  • 1Jakobsson M,Sako K,Impagliazzo ILDesignated verifier proofs and their applications[C]//Proccedings of Eurocrypt'96.[S.l.]:Springor-Verlag,1996:143-154.
  • 2Shamir A.Identity-bnsed cryptnsystems and signature schemes[C]//LNCS 196:Advances in Cryptology,Crypto'84,Berlin,1984:47-53.
  • 3Boneh D,Franldin M.Identity-bnsed encryption from the well pairing[C]//LNCS 2139:Advances in Cryptology.Berlin:Springor-Verlag,2001:213-229.
  • 4Boneh D,Lynn B,Shacham H.Short signature from the well pairing[C]//LNCS 2248:Advances in Cryptology,Asiaorypt 2001.Berlin:Springer-Vorlag,2001:514-532.
  • 5Huang X,Suslilo W,Mu Y,et al.Short(identity-based) strong designetted verifier signature schemes[C]//The Information Security Practice and Experience Conforence,Hangzhou.Borlin Heidelberg:Springer,2006:214-225.
  • 6Suslilo W,Zhang F,Mu Y.Identity-based strong designated verifier signature schemes[C]//The Conference on Information Security and Priracy,Sydney.Borlin Heidelborg:Springer,2004:313-324.
  • 7Kang B,Boyd C,Dawson E.Identity-based strong designated vorifier signature schemes:Attacks and new construction[J].Computere and Electrical Engineering,2009,35:49-53.
  • 8Lipmaa H,Wang G,Bao F.Designated verifier signature schemes:Attacks,new security notions and a new construction[C]//International Colloquium on Automata,Languages and Programming,Lisboa.Berlin Heidelberg:Springor,2005:459-471.
  • 9Li Y,Lipmaa H,Pei D.On delegatability of four designated verifier signatures[C]//The International Conference on Information and Communications Security,Beijing.Berlin Heidelberg:Springor,2005:61-71.
  • 10Wang Bin.A non-delegatable identity-based strong designated verifier signature scheme[EB/OL].[2O10-02-06].http://eprint.iacr.org/2008/507.pdf.

同被引文献5

  • 1HUANG X, SUSLILO W, MU Y, et al. Short ( identi- ty-based) strong designated verifier signature schemes [C]. The Information Security Practice and Experi- ence Conference. Hangzhou Springer Berlin/Heidel- berg, 2006 :214-225.
  • 2SUSLILOW, ZHANG F, MU Y. Identity-based strong designated verifier signature sehemes[C]. The Confer- enee on Information Security and Priraey. Sydney: Springer Berlin/Heidelberg 2004,313-324.
  • 3KANG B, BOYD C, DAWSON E. Identity-based strong designated verifier signature schemes: attacks and new construction [J]. Computers and Electrical Engineering, 2009(35) :49-53.
  • 4LI Y, LIPMA H, PEI D. On delegatability of four des- ignated verifier signatures[C]. The International Con- ference on Information and Communications Security. Beijing : Springer Berlin/Heidelberg, 2005 : 61-71.
  • 5ZHANG F G,KIM K. Efficient ID-based blind signa- ture and proxy signature from bilinear pairings[C]. Advances in ACISP 2003. Berlin: Springer, 2003 : 312- 323.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部