期刊文献+

零知识证明的前向安全不可否认数字签名方案 被引量:4

Forward-secure Undeniable Digital Signature Scheme Based on Zero-knowledge Proof
下载PDF
导出
摘要 基于零知识的证明,提出了一种前向安全不可否认数字签名方案。将不可否认数字签名与前向安全数字签名结合起来,保持了不可否认数字签名的一般特点,并具有前向安全性,在签名密钥泄露的情况下可将损失减少到最小。该方案具有签名不可伪造性和不可否认性、签名和密钥长度短等特点。密钥更新协议使用了零知识证明的思想,保证密钥进化的安全性。在标准困难问题假设下,该方案是安全的。 This paper proposes a forward-secure undeniable digital signature scheme based on zero-knowledge proof. By combining the undeniable digital signature with the forward-secure digital signature, the new scheme keeps the general property of undeniable digital signature, and has the character of forward-secure, namely, the loss can be reduced to the lowest once the secret key is lost (or stolen). The scheme has some features such as undeniable and unforgeable of the digital signature, and the size of key and signature are short. The idea of zero-knowledge proof is used in key update protocol, which guarantees key update is secure. The scheme is secure under the assumption of standard intractability problems.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第8期27-29,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60273089) 陕西省教育厅自然科学研究计划基金资助项目(03JK165) 西安理工大学科技创新基金资助项目(108210402) 西安市集成电路与软件专项基金资助项目(ZX04011)
关键词 数字签名 不可否认 前向安全 零知识证明 Digital signature Undeniable Forward-secure Zero-knowledge proof
  • 相关文献

参考文献6

  • 1Chaum D, Antwerpen V. Undeniable Signatures[C]//Proc. of Advances in Cryptology-crypto. 1989:212-216.
  • 2Bellare M, Miner S K. A Forward-secure Digital Signature Scheme[C]//Proc. of Advances in Cryptology-CRYPTO. 1999:431-448.
  • 3Krawczyk H. Simple Forward-Secure Signatures from any Signature Scheme[C]//Proc. of the 7^th ACM Conference on Computer and Communication Security. 2000-10:1-4.
  • 4Malkin T, Micciancio D, Miner S. Effcient Generic Forward-secure Signatures with an Unbounded Number of Time Periods[C]//Proc. of Advances in Cryptology-EUROCRYPT. 2002.
  • 5Abdalla M, Reyzin L. A New Forward-secure Digital Signature Scheme[C]//Proc. of Advances in Cryptology-ASIACRYPT. 2000.
  • 6王尚平,王育民,王晓峰,秦波,张亚玲.基于零知识证明的前向安全数字签名方案[J].通信学报,2003,24(9):42-47. 被引量:21

二级参考文献8

  • 1BELLARE M, MINER S. A forward-secure digital signature scheme[A]. Advances in Cryptology-CRYPTO'99,Lecture Notes in Compute Science[C]. Spring-Verlag, 1999.431-448.
  • 2RIVEST R, SHAMIR A, ADLMAN L. A method for obtaining digital signatures and public-key cryptosystems[J].Communlcations ACM, 1978, 21(2):120-126.
  • 3POINCTCHEVAL D, STERN J. Security proof for signature schemes[A]. Advances in Cryptology-EUROCRYPTO'96, Lecture Notes in Compute Science Vol. 1070[C]. Spring-Verlag, 1996. 387-398.
  • 4GOLDWASSER S, MICLIS. Probabilistic encryption[J]. Journal of computer and system, 1984, 28(2):270-299.
  • 5BELLARE M, ROGAAWAY P. Random oracles are practical: a paradigm for designing efficient protocols[A]. Proceedings of the First Annual Conference on Computer and Communications Security[C]. 1993.1-20.
  • 6BELLARE M, ROGAAWAY P. The exact security of digital signatures: How to sign with RSA and Rabin[A]. Advances in Cryptology-EUROCRYPTO'96, Lecture Notes in Compute Science[C]. Spring-Verlag, 1996. 399-416.
  • 7CAMENISCH J, STADLER M. Efficient group signatures schemes for large groups[A]. Advances in Cryptology-CRYPT'97, Lecture Notes in Compute Science[C]. Berlin: Springer-Verlag, 1997.410-423.
  • 8POINCTCHEVAL D, STERN J. Security arguments for digital signatures[J]. Journal of Cryptology, 2000, 113(3):361-396.

共引文献20

同被引文献20

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部