期刊文献+

一种新的基于身份的代理签名方案 被引量:4

New ID-based Proxy Signature Scheme
在线阅读 下载PDF
导出
摘要 分析一种基于身份的代理签名方案(哈尔滨工业大学学报,2008年第7期),指出其不安全性,容易受到PKG发起的假冒伪造攻击,PKG可以假冒原始签名人代理授权,也可以伪造有效的代理签名。给出改进方案,以纠正原方案的错误,可有效弥补原方案的设计缺陷,限制PKG的权限,保护签名人的利益。 Through the security analysis of an ID-based proxy signature scheme(Journal of Harbin Institute of Technology,2008,No2),this paper points out it is unsafe and suffers from forgery attack launched by PKG.PKG not only can counterfeite proxy-authorization,but also can forgery a valid proxy signature.An improved scheme based on the property of original scheme is proposed and its security weakness is overcome.In the new scheme,the power of PKG is limited and the benefit of signer is protected,so it is more secure and efficient.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第7期157-159,共3页 Computer Engineering
基金 河北师范大学附属民族学院科研基金资助项目(200906Y03-2) 河北师范大学科研基金资助项目(L2010Q15)
关键词 信息安全 数字签名 代理签名 基于身份 双线性对 information security digital signature proxy signature ID-based bilinear pairings
  • 相关文献

参考文献9

  • 1ShamirA.Identity-basedCryptosystemsandSignature Schemes[C]//Proceedings of CRYPTO'84.Berlin,Germany:Springer-Verlag,1984:47-53.
  • 2Mambo M,Usuda K,Okamoto E.Proxy Signatures for Delegating Signing Operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Security.New York,USA:ACM Press,1996:48-57.
  • 3Zhang Fangguo,Kim K.Efficient ID-based Blind Signature and Proxy Signature from Bilinear Pairings[C]//Proceedings of the 8th Australasian Conference on Information Security and Privacy.Berlin,Germany:Springer-Verlag,2003:312-323.
  • 4Bellare M,Rogaway P.Random Oracles Are Practical:A Paradigm for Designing Efficient Protocols[C]//Proceedings of the 1st ACM Conference on Computer and Communications Security.New York,USA:ACM Press,1993:62-73.
  • 5Xu Jing,Zhang Zhenfeng,Feng Dengguo.ID-based Proxy Signature Using Bilinear Pairings[C]//Proceedings of the 3rd International Symposium on Parallel and Distributed Processing and Applications.Berlin,Germany:Springer-Verlag,2005:359-367.
  • 6Wu Wei,Mu Yi,Susilo W,et al.Identity-based Proxy Signature From Pairings[C]//Proceedings of the 4th International Conference on Autonomic and Trusted Computing.Berlin,Germany:Springer-Verlag,2007:22-31.
  • 7Canetti R,Goldreich O,Halevi S.The Random Oracle Methodology[C]//Proceedings of the 30th Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press,1998:209-218.
  • 8刘春刚,周廷显,强蔚.一种身份基代理签名方案的研究[J].哈尔滨工业大学学报,2008,40(7):1052-1054. 被引量:3
  • 9Xun Yi,An Identity-based Signature Scheme from the Weil Pairing[J].IEEE Communications Letters,2003,7(2):76-78.

二级参考文献7

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [ C ]//Proc Crypto 84, LNCS 196. Berlin: Springer-Verlag, 1985:47-53.
  • 2BONEH D, FRANKLIN M. Identity-based encryption from the Weil Pairing [ C ]//AdvanCes in Cryptology CCrypto'2001, LNCS 2139. Berlin: Springer-Verlag, 2001:213 - 229.
  • 3BONEH D, LYNN B, SHACHAM H: Short signatures from the weil pairing[ C ]//Proc Asiacrypt'2001, LNCS 2248. Berlin : Springer-Verlag, 2001:514 - 532.
  • 4CHA J C, CHEON J H. An Identity-based signature from Gap Diffie-Helhnan groups [ EB ]. Cryptology ePrint Archive, available at http ://eprint. iaccr. org/. Report 2002/018.
  • 5PATERSON K G. ID-based signatures from pairings on elliptic curves [ EB ]. Cryptology ePrint Archive, available at http ://eprint. iacr. org/. Report 2002/004.
  • 6HESS F. Efficient Identity based signature schemes based on pairings[ C ]//Proceedings of 9th workshop on selected areas in Cryptography, Sacremento, Lecture notes in Computer Science. Berlin: Springer- Verlag, 2002 : 651 - 667.
  • 7Xun Yi, An Identity-based Signature Scheme From the Well Pairing[J]. IEEE Communications Letters, 2003, 7(2) :76 -78.

共引文献2

同被引文献33

  • 1Shamir A.Identity-based cryptosystems and signature schemes[C]// Proc of CRYPTO' 84.Berlin, Germany: Springer-Verlag, 1984 : 47-53.
  • 2Mambo M,Usuda K, Okamoto E.Proxy signatures for dele- gating signing operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York,USA:ACM Press, 1996:48-57.
  • 3Zhang Fangguo, Kim K.Efficient ID-based blind signature and proxy signature from bilinear pairings[C]//Proceedings of the 8th Australasian Conference on Information Security and Privacy.Berlin, Germany: Springer-Verlag, 2003 : 312-323.
  • 4Canetti R,Goldreich O,Halevi S.The random oracle methodo- logy[C]//Proceedings of the 30th Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press, 1998: 209-218.
  • 5Xu Jing,Zhang Zhenfeng,Feng Dengguo.ID-based proxy sig- nature using bilinear pairings[C]//Proceedings of the 3rd Inter- national Symposium on Parallel and Distributed Processing and Applications.Berlin, Germany: Springer-Verlag, 2005 : 359-367.
  • 6Wu Wei,Mu Yi,Susilo W,et al.Identity-based proxy signa- ture from pairings[C]//Proceedings of the 4th International Conference on Autonomic and Trusted Computing.Berlin, Germany : Springer-Verlag, 2007 : 22-31.
  • 7舒蕾,陈再兴.一种高效的基于身份的代理签名方案[J].软件导刊,2009,8(10):164-166.
  • 8Shamir A.Identity-based cryptosystems and signature schemes[C]//Proceedings of Crypto'84.Berlin:Springer- Verlag, 1984: 47-53.
  • 9A1-Riyami S,Paterson K.Certificateless public key cryp- tography[C]//LNCS 2894:Asiacrypt 2003.Berlin:Springer- Verlag, 2003 : 452-473.
  • 10Mambo M,Usuda K, Okamoto E.Proxy signatures for delegating signing operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Se- curity.New York: ACM Press, 1996 : 48-57.

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部