期刊文献+

基于身份的门限代理签名方案 被引量:8

ID-based Threshold Proxy Signature Scheme
在线阅读 下载PDF
导出
摘要 利用双线性对构造一个基于身份的门限代理签名方案,生成的签名长度短,签名者可以将签名和自己的公钥同时发送给接收方,接收方通过验证对方公钥确实由私钥生成中心颁发,从而避免向第三方请求签名者公钥,提高方案效率。分析结果表明,该方案安全可靠,具有匿名性。 This paper structures an ID-based threshold proxy signature scheme by using bilinear pairings.It is a short signature.The signers send the signature together with their public keys to the receiver.Then,the receiver can confirm that the signers' public keys are granted by Private Key Generator(PKG).through the verification.In this case,it avoids requesting signers' public keys from a third party,thus enhancing the effectiveness.Analysis results show that the scheme not only satisfies security properties,but also has the property of anonymity.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第7期171-172,177,共3页 Computer Engineering
基金 国家自然科学基金资助项目(10571113) 陕西省自然科学基金资助项目(2009JM8002) 陕西省教育厅科学研究计划自然科学基金资助项目(07JK375 2010JK829)
关键词 门限代理签名 基于身份的签名 双线性对 匿名性 threshold proxy signature ID-based signature bilinear pairings anonymity
  • 相关文献

参考文献11

  • 1Mambo M,Usuda K,Okamoto E.Proxy Signature for Delegating Signing OperationfC]//Proc.of the 3rd ACM Conference on Computer and Communications Security.New York,USA:ACM Press,1996.
  • 2Kim S,Park S,Won D.Proxy Signature,Revisited[C]//Proc.ofICICS'97.Berlin,Germany:Springer-Verlag,1997.
  • 3Hu Jiangho,Zhang Jianzhong.Cryptanalysis and Improvement of a Threshold Proxy Signature Scheme[J].Computer Standards &Interfaces,2009,31(1):169-173.
  • 4Shamir A.Identity Based Cryptosystems and Signature Schemes[C]//Proc.of Cryptoloy-CRYPTO'84.Berlin,Germany:Springer-Verlag,1984.
  • 5Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[C]//Proc.of Cryptoloy-CRYPTO'01.Berlin,Germany:Springer-Verlag,2001.
  • 6Cocks C.An Identity Based Encryption Scheme Based on Qua dratic Residues[C]//Proc.of the 8th IMA International Conference on Cryptography and Coding.Berlin,Germany:Springer-Verlag,2001.
  • 7Qiu Weidong,Chen Kefei.Identity Oriented Signature Scheme Based on Quadratic Residues[J].Applied Mathematics and Computation,2005,168(1):235-242.
  • 8涂峰,赵一鸣.一种基于身份的门限盲签名方案[J].计算机工程,2008,34(21):118-119. 被引量:5
  • 9张学军.基于身份的代理盲签名方案的分析与改进[J].计算机工程,2009,35(23):122-123. 被引量:9
  • 10刘宏伟,谢维信,喻建平,赵超.一种基于身份的数字签名算法研究[J].系统工程与电子技术,2008,30(6):1159-1162. 被引量:7

二级参考文献23

  • 1Cheng Xiangguo Xu Weidong Wang Xinmei.A THRESHOLD BLIND SIGNATURE FROM WEIL PAIRING ON ELLIPTIC CURVES[J].Journal of Electronics(China),2006,23(1):76-80. 被引量:6
  • 2李素娟,张福泰.基于ID的代理盲签名[J].计算机工程,2006,32(17):203-204. 被引量:8
  • 3Shamir A. Identity-based cryptosystems and signature schemes [C]// Advances in Cryptology-CRYPTO'84, LNCS, Springer-Verlag, 1984,196:47 - 53.
  • 4Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems[C]//Advances in Cryptology-Crypto ' 86, LNCS Berlin : Springer-Verlag, 1987, 263,186 - 194.
  • 5Guillou L C, Quispuater J J. A "paradoxical" identity-based signature scheme resulting from zero-knowledge[C]///Advances in Cryptology-Crypto ' 98, LNCS Berlin : Springer-Verlag,1990,403: 216-231.
  • 6Fiege U. Fiat A, Shamir A. Zero-knowledge proofs of identity [J]. Journal of Cryptology, 1998, 1(2) : 77 - 94.
  • 7Cocks C. An identity based encryption scheme based on quadratic residues[C]//Proc of the IMA Int'l Conf on Cryptography and Coding, LNCS Berlin : Springer-Verlag. 2001, 2260 : 360 - 363.
  • 8Boneh D, Franklin M. Identity-based encryption from the weil pairing[C] //Advance in Cryptology-CRYPTO 2001. LNCS2001, 2139: 213-229.
  • 9Sakai R, Ohgishi K, Kasahara M. Cryptosystems based on pairing[C]//Symposium on Cryptography and Information Security ( SCIS' 00),Okinawa. 2000 : 26 - 28.
  • 10Paterson K G. ID-based signature from pairing on elliptic curves [R]. Cryptologye Print Archive. Tech Rep : 2002/004. http://eprint.iacr. org/2002/004.

共引文献19

同被引文献54

引证文献8

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部