期刊文献+

一种不含双线性对的可截取签名方案 被引量:4

Content Extraction Signature Scheme Without Bilinear Pairings
在线阅读 下载PDF
导出
摘要 现有可截取签名方案需要计算双线性对,计算效率较低。针对该问题,基于无证书思想,提出一个不含双线性对的可截取签名方案。采用绑定技术,通过哈希函数将用户公钥绑定在部分私钥的生成算法及签名算法中,以降低公钥替换攻击的可能性。在随机预言机模型下证明方案效率较高,签名是不可伪造的。 For the existing content extraction signature scheme, because calculated bilinear pairings caused the problem of low efficiency, based on certificateless thinking, this paper proposes an efficient content extraction signature scheme without pairings. Scheme of binding techniques, use hash functions will the public key binding to the partial private key generates and signature algorithms, reduce the possibility of public key substitution attack, and in the random oracle model proved scheme is existentially unforgeable under adaptive chosen-message attacks assuming. Compared with known solutions, the efficiency is higher.
出处 《计算机工程》 CAS CSCD 2012年第3期110-112,共3页 Computer Engineering
基金 国家自然科学基金资助项目(61063041) 教育部科学技术研究基金资助重点项目(208148) 甘肃省教育厅基金资助重点项目(0801-01)
关键词 可截取签名 离散对数问题 双线性对 哈希函数 随机预言机模型 content extraction signature Discrete Logarithm Problem(DLP) bilinear pairings Hash function random oracle model
  • 相关文献

参考文献7

  • 1Steinfeld R, Bull L, Zheng Yuliang. Content Extraction Signatures[C] //Proceedings of the 4th International Conference on Information Security and Cryptology. Berlin, Germany: Springer- Verlag, 2001: 285-304.
  • 2Bull L, Stanskip P. Content Extraction Signature Using XML Digital Signatures and Custom Transforms On-demand[C] // Proceedings of the 12th International World Wide Web Conference. New York, USA: ACM Press, 2003: 170-177.
  • 3Bull L, Squire M D, Zheng Yuliang. A Hierarchical Extraction Policy for Content Extraction Signatures[J]. International Journal of Digital Libraries, 2004, 4(3): 208-222.
  • 4蓝才会,王彩芬.基于身份的可截取签名方案[J].计算机应用,2007,27(10):2456-2458. 被引量:8
  • 5葛爱军,陈少真.具有强安全性的不含双线性对的无证书签名方案[J].电子与信息学报,2010,32(7):1765-1768. 被引量:18
  • 6张玉磊,王彩芬,张永洁,韩亚宁,程文华.无证书签名改进方案的安全性证明[J].计算机工程,2010,36(12):170-172. 被引量:3
  • 7Rafael C, Ricardo D. Two Notes on the Security of Certificateless Signature[M]. Berlin, Germany: Springer-Verlag, 2007.

二级参考文献21

  • 1刘颖,胡予濮,王飞,卢晓君.一个高效的基于身份的门限签名方案[J].西安电子科技大学学报,2006,33(2):311-315. 被引量:13
  • 2刘军龙,王彩芬.基于身份的可截取门限签名方案[J].计算机应用,2006,26(8):1817-1820. 被引量:7
  • 3Al-Riyami S S,Paterson K G.Certificateless Public Key Cryptography[C] //Proc.of ASIACRYPT'03.Berlin,Germany:Springer-Verlag,2003:452-473.
  • 4Pointcheval D,Stern J.Security Arguments for Digital Signatures and Blind Signatures[J].Journal of the International Association for Cryptologic Research,2000,13(3):361-396.
  • 5Rafael C,Ricardo D.Two Notes on the Security of Certificateless Signatures[C] //Proc.of Conf.on Security.Berlin,Germany:Springer-Verlag,2007:85-102.
  • 6STEINFELD R,BULL L,ZHENG Y.Content extraction signatures[C]// Proceedings of 4th international conference on information security and cryptology (ICISC 2001).Berlin:Springer-Verlag,2001:285-304.
  • 7BULL L,STANSKI P,MCG SQU RE D.Content extraction signatures using XML digital signatures and custom transforms on 3/demand[C]// Proceedings of the 12th international World Wide Webconference (WWW2003).New York:ACM Press,2003:170-177.
  • 8BULL L,MCG SQU RE D,ZHENG Y.A hierarchical extraction policy for content extraction signatures[J].International Journal on Digital Libraries,2004,4(3):208-222.
  • 9FIAT A.Batch RSA[J].Journal of Cryptology,1997,10(2):75-88.
  • 10CHEON J H,KIM Y,YOON H J.A new ID-based signature withbatch verification[EB/OL].[2004-05-31].http://eprint.iacr.org/2004/131.

共引文献24

同被引文献31

  • 1刘军龙,王彩芬.基于身份的可截取门限签名方案[J].计算机应用,2006,26(8):1817-1820. 被引量:7
  • 2Steinfeld R, Bull L, Zheng Y. Content Extraction Signatures[C]//Proc. of the 4th International Conference on Information Security and Cryptology. Berlin, Germany: Springer-Verlag, 2001: 285-304.
  • 3Bull L, Squire M D, Zheng Y. A Hierarchical Extraction Policy for Content Extraction Signatures[J]. International Journal on Digital Libraries, 2004, 4(3): 208-222.
  • 4Shamir A. Identity-based Cryptosystems and Signature Schemes[C]//Proc. of CRYP'84. Berlin, Germany: Springer-Verlag, 1984: 47-53.
  • 5Huang Xinyi, Mu Yi, Susilo W, et al. Certificateless Signature Revisited[C]//Proc. of ACISP'07. Berlin, Germany: Springer-Verlag, 2007: 308-322.
  • 6Steinfeld R, Bull L. Content Extraction Signatures [C]//Proc. of the 4th International Conference on Information Security and Cryptology. Berlin, Germany: Springer-Verlag, 2001 : 285-304.
  • 7Bull L, Stanski P, Mcg S D. Content Extraction Signatures U- sing XML Digital Signatures and Custom Transforms On-de- mand[C]//Proc, of the 12th International World Wide Web Conference New York, USA: ACM Press, 2003 : 170-177.
  • 8Ye Shu-ying, Ou Fu-na, Zhang Hai-ling. An ID-Based Content Extraction Signatures Without Trusted Party. Industrial Elec- tronics and Applieations(ICIEA)[C]//2010 the 5th IEEE Con- ference on Digital Object Identifier. 2010:1801-1804.
  • 9He D B, Chen J H, Zhang R. Efficient and provably-secure cer- tificateless signature scheme without bilinear pairings[R]. Re- port 2010/632. Cryptology ePrint Archive, 2010.
  • 10A1-Riyami S, Paterson K. Certificateless public key cryptography [C] /// LNCS 2894 : Proceedings of Asiacrypt ' 03. Berlin: Sprin- ger-Verlag, 2003 : 452-473.

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部