期刊文献+

高效的基于证书强指定验证者签名方案 被引量:1

Efficient certificate-based signature scheme with strong designated verifier
在线阅读 下载PDF
导出
摘要 针对基于身份公钥密码系统下的强指定验证者签名中的第三方完全可信问题及已有签名方案效率不高的问题,利用基于证书密码系统中证书认证机构(CA)的信任级别低的优点,提出了一个新的强指定验证者签名方案。在随机预言模型下基于双线性Diffie-Hellman(BDH)问题假设给出了形式化的安全性分析。通过性能分析可看出:该方案能满足强指定验证者签名方案的所有性质,且签名长度仅为群中一个元素,具有较高的通信效率,适用于带宽受限的环境。 Concerning the flaw that it needs a fully credible third party in ID-based strong designated verifier signature and the low efficiency of existing schemes, taking the advantage of Certificate Authority (CA) 's low trust level in certificate- based public key cryptography, a new strong designated verifier signature scheme was proposed in this paper. Furthermore, the formal security analysis under assumed Bilinear Diffie-Hellman (BDH) problem in the random oracle model was presented. Performance analysis shows the scheme meets all properties of strong designated verifier signature schemes and enjoys higher correspondence efficiency used in bandwidth limited environment since the signature length is just one of the group elements.
出处 《计算机应用》 CSCD 北大核心 2013年第3期759-761,813,共4页 journal of Computer Applications
基金 青岛市科技发展计划项目(11-2-4-6-(1)-jch) 山东科技大学研究生创新基金资助项目(YCA120340)
关键词 强指定验证者 证书认证机构 基于证书公钥密码系统 随机预言模型 双线性Diffie—Hellman问题 strong designated verifier Certificate Authority (CA) Certificate-Based Public Key Cryptography (CB-PKC) random oracle model Bilinear Diffie-Hellman (BDH) problem
  • 相关文献

参考文献13

  • 1GENTRY C. Certificate-based encryption and the certificate revocation problem[A].Beilin:Springer-Verlag,2003.272-293.
  • 2KANG B G,PARK J H,HAHN S G. A certificate-based signature scheme[A].Beilin:Springer-Verlag,2004.99-111.
  • 3LI J G,HUANG X Y,MU Y. Certificate-based signature:security model and efficient construction[A].Beilin:Springer-Verlag,2007.110-125.
  • 4LI J G,XU L Z,ZHANG Y C. Provably secure certificate-based proxy signature schemes[J].Journal of Computers,2009,(06):444-452.
  • 5LI J G,HUANG X Y,ZHANG Y C. An efficient short certificate-based signature scheme[J].Journal of Systems and Software,2012,(2012):314-322.
  • 6JAKOBSSON M,SAKO K,IMPAGLIAZZO R. Designated verifier proofs and their applications[A].Beilin:Springer-Verlag,1996.143-154.
  • 7SAEEDNIA S,KREMER S,MARKOWITCH O. An efficient strong designated verifier signature scheme[A].Beilin:Springer-Verlag,2004.40-54.
  • 8SUSILO W,ZHANG F T,MU Y. Identity-based strong designated verifier signature schemes[A].Beilin:Springer-Verlag,2004.313-324.
  • 9ZHANG J,MAO J. A novel ID-based designated verifier signature scheme[J].Information Sciences,2008,(03):766-773.
  • 10KANG B Y,BOYD C,DAWSON E. Identity-based strong designated verifier signature schemes:Attacks and new construction[J].Computers and Electrical Engineering,2009,(01):49-53.

二级参考文献27

  • 1李明祥,郑雪峰,朱建勇,闫鹏.一种高效的基于身份的强指定验证者签名方案[J].四川大学学报(工程科学版),2009,41(4):176-180. 被引量:5
  • 2JAKOBSSON M,SAKO K,IMPAGLIAZZO R.Designated verifier proofs and their applications[C]//Cryptology-EUROCRYPT 1996,LNCS 1070.Berlin:Springer-Verlag,1996:142-154.
  • 3SUSILO W,ZHANG FANGGUO,MU YI.Identity based strong designated verifier signature schemes[C]//ACISP'2004:Proceedings of the 9th Australasian Conference on Information Security and Privacy,LNCS 3108.Berlin:Springer-Verlag,2004:313-324.
  • 4KUMAR K P,SHAILAJA G,SAXENA A.Identity based strong designated verifier signature scheme[EB/OL].[2009-09-22].http://eprint.iacr.org/2006/134.pdf.
  • 5ZHANG J,MAO J.A novel id-bascd designated verifier signature scheme[J].Information Sciences,2008,178(3):766-773.
  • 6]BONEH D,LYNN B,SHACHAM H.Short signature from the Weil pairing[C]// Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology,LNCS 2248.Berlin:Springer-Verlng,2001:514-532.
  • 7Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and their applications [ C 1//Proceedings of Eurocrypt 1996. LNCS 1070, Berlin: Springer-Verlag, 1996:143 - 154.
  • 8Saeednia S, Kremer S, Markowitch O. An efficient strong designated verifier signature scheme [ C ]//Proceedings of the 6^th Int Conf on Information Security and Cryptology ( ICISC ' 2003 ). LNCS 2971, Berlin : Springer-Verlag, 2004 : 40 - 54.
  • 9Susilo W,Zhang F T, Mu Y. Identity-based strong designated verifier signature schemes [ C ]//Proceedings of the 9^th Australasian Conference on Information Security and Privacy ( ACISP ' 2004 ). LNCS 3108, Berlin: Springer-Verlag, 2004 : 313 - 324.
  • 10Kumar K P, Shailaja G, Saxena A. Identity based strong designated verifier signature scheme [ EB/OL ]. http ://eprint. iacr. org/2006/134.

共引文献4

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部