期刊文献+

一个有效的代理环签名方案 被引量:11

An Efficient Proxy Ring Signature Scheme
下载PDF
导出
摘要 提出了一个有效的代理环签名方案.该方案中,原始签名人首先对授权信息签名,环中的代理签名人生成自己的代理密钥以后,利用修改的Chow提出的基于身份的环签名算法签名.在随机预言机模型下利用环签名分叉引理证明了所提方案的强不可伪造性依赖于CDH问题.代理环签名的计算不需要配对运算,签名验证只需要2个配对运算,与现有方案相比,新方案具有更高的计算效率. An efficient proxy ring signature scheme was proposed. The original signer firstly signs a warrant and then the proxy signers in the ring generate their proxy private keys and finally, each proxy signer can finally generate a proxy ring signature using the modified identity based ring signature proposed by Chow. Strong unforgeability of the new scheme was proven to rely on CDH problem by using forking lemma for ring signature under the random oracle model. No pairing operation is required for the generation of a proxy ring signature and only two pairing operations are required for the verification. Comparing with the existing schemes, the new scheme is more efficient in computation.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2007年第3期23-26,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(6037204660573043)
关键词 双线性对 代理签名 环签名 匿名性 bilinear pairings proxy signature ring signature ambiguity
  • 相关文献

参考文献12

  • 1Rivest R,Shamir A,Tauman Y.How to leak a secret[C]∥Proc of Asiacrypt 2001.Berlin:Springer-Verlag,2001:552-565.
  • 2Abe M,Ohkubo M,Suzuki K.1-out-of-n signatures from a variety of keys[C]∥Proc of Asiacrypt 2002.Berlin:Springer-Verlag,2002:415-423.
  • 3Zhang F,Kim K.ID-based blind signature and ring signature from pairings[C]∥Proc of Asiacrypt 2002.Berlin:Springer-Verlag,2002:533-574.
  • 4Chow S S M,Hui L C K,Yiu S M.Efficient identity based ring signature[C]∥Proc of ACNS 2005.Berlin:Springer-Verlag,2005:499-512.
  • 5Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Trans Fundamentals,1996,E79-A(9):1338-1353.
  • 6谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 7Lee B,Kim H,Kim K.Strong proxy signature and its applications[C]∥Proc of ACISP 2001.Japan:[s.n.],2001:603-608.
  • 8Zhang F,Naini R,Lin C Y.New proxy signature,proxy blind signature and proxy ring signature schemes from bilinear pairings[EB/OL].[2006-05-20].http:∥eprint.iacr.org/2003/.
  • 9Amit K,Sunder L.ID-based ring signature and proxy ring signature schemes from bilinear pairings[J].Internal Journal of Network Security,2007,4(2):187-192.
  • 10Boneh D,Franklin M.Identity-based encryption from the weil pairing[C]∥Proc of Crypto 2001.Berlin:Springer-Verlag,2001:213-229.

二级参考文献6

  • 1Mambo M, Usuda K, Okamoto E. Proxy signature:delegation of the power to sign messages[A]. EICE Trans Fundamentals[C]. 1996. 1338-1353.
  • 2Lee B, Kim H, Kim K. Strong proxy signature and it's applications [A]. International Conference on Information and Communication Security, Proc of SCIS[C]. Japan, 2001. 603-608.
  • 3Kim S, Park S, Won D. Proxy signature, revisited[A]. International Conference on Information and Communication Security, Proc of ICICS[C]. Berlin,1997. 223-232.
  • 4Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature FA 1. Proc ACISP[C]. Spring-Verlag, 2001. LNCS 1 334, 474-486.
  • 5Shum K, Wei Victor K. A strong proxy signature scheme with proxy signer privacy protection [EB/OL]. http: // www. computer. org/proceedings/wetice/1748/17480055. pdf, 2002.
  • 6Boyd C. Comment :new digital signature scheme based discrete logarithm[J]. Electronics Letters, 1994, 30(6) : 480-481.

共引文献23

同被引文献114

引证文献11

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部