期刊文献+

基于无可信第三方IBS的XML数字签名 被引量:2

XML signature based on IBS without trusted third-party
下载PDF
导出
摘要 传统XML数字签名基于公共密钥基础设施(PKI)体系和非对称算法,存在管理复杂、计算量大等缺陷。通过对XML数字签名规范和无可信第三方基于身份的签名(IBS)方案的研究,采用无可信第三方IBS的密钥管理机制和对应椭圆曲线双线性映射算法实现XML数字签名,按照XML数字签名规范的要求,对相应XML数字签名实现过程和XML数字签名文件结构进行了设计,并分析了具体实现方式。该XML数字签名方案在保证安全性的同时,克服了传统基于PKI的XML数字签名的缺陷,具有更高的效率。 Based on the Public-Key Infrastructure (PKI) system and asymmetric encryption algorithm, the traditional XML signature has many drawbacks such as complex management process and high computational cost. By the research of XML signature syntax and Identity Based Signature (IBS) scheme without a trusted third-party, the author realized a new XML signature based on the above IBS system and Weil pairing correspondingly, and designed the corresponding XML signature process and structure of XML signature according to the XML signature syntax. The new XML signature overcomes the drawbacks of traditional signature based on the PKI with good security and high efficiency.
出处 《计算机应用》 CSCD 北大核心 2009年第5期1297-1300,共4页 journal of Computer Applications
基金 四川省教育厅青年基金资助项目(07ZB049)
关键词 XML数字签名 基于身份的签名 CZK方案 双线性映射 密钥 XML digital signature Identity Based Signature (IBS) CZK scheme Weil pairing key
  • 相关文献

参考文献9

  • 1陈赫贝,阮飞.XML数字签名及其应用研究[J].微机发展,2005,15(2):53-55. 被引量:6
  • 2田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16
  • 3唐春明,赵延孟.使用双线性对构造基于身份的不可否认签名(英文)[J].深圳大学学报(理工版),2006,23(1):85-89. 被引量:3
  • 4刘宏伟,谢维信,喻建平.一种基于身份的无可信第三方签名方案[J].深圳大学学报(理工版),2007,24(3):257-260. 被引量:2
  • 5XML-signature syntax and processing [ EB/OL]. (2001 -08 - 20) [2008 - 09 - 06]. http://www, w3. org/TR/2001/PR-xmldsigcore.
  • 6SHAMIR A. Identity-base cryptosystems and signature schemes [ C]// Proceedings of CRYPTO 84 on Advances in Cryptology, LNCS 196. Berlin: Springer-Verlag, 1985:47-53.
  • 7HESS F. Eficient identity based signature schemes based on pairings [ C]//The 9th Annual International Workshop on Selected Areas in Cryptography: SAC&apos 02. Berlin: Springer-Verlag, 2003:3 1 0 - 324.
  • 8CHEN XIAO-FENG, ZHANG FANG-GUO, KIM K. A New ID-based group signature scheme from bilinear pairings [ EB/OL]. [ 2008 -08 -06]. http://eprint, iacr. org/2003/116, pdf.
  • 9BONEH D, LYNN B, SHACHAM H. Short signatures from the weil pairing [ C]// Asiacrypt'01, LNCS 2248. Berlin: Springer-Verlag, 2001 : 514 - 532.

二级参考文献64

  • 1唐春明,赵延孟.使用双线性对构造基于身份的不可否认签名(英文)[J].深圳大学学报(理工版),2006,23(1):85-89. 被引量:3
  • 2Chaum D,H van Aantwerpen.Undeniable signatures.Brassard G .Advances in Cryptology-CRYPTO '89 [C].Berlin:Springer-Verlag Press,1989,212-216.
  • 3Chaum D.Zero-knowledge undeniable signatures.Dsmgard I B.Advances in Cryptology EURO-CRYPT'90 [C].Berlin:Springer-Verlag Press,1990,458-464.
  • 4Chaum D,E van Heyst.Group Signatures.Goos G,Hartmanis J.Advances in Cryptology EUROCRYPT '91 [C] .Berlin:Springer-Verlag Press,1991,257-265.
  • 5TANG Chun-ming.Zero-knowledge proof systems in number theory and their applications [D].Beijing:Chinese Academy of Science,2004 (in Chinese).
  • 6Han S,Yeung K Y,Wang J.Identity-based confirmer signatures from pairings over elliptic curves.Proceedings of ACM conference on Electronic commerce citation 2003[C].NY:ACM Pross 2003,262-263.
  • 7Zhang F,Naini R S,Susilo W.Attack on Han et al's IDbased confirmer (undeniable) signature at ACM-EC'03[EB/OL].[2003-06-29].http://eprint.izcr.org/2003/129.
  • 8Chaum D,Evertse J H,J van de Graaf,et al.Demonstrating possession of a discrete logarithm without revealing it.odlyzko A M.Advances in Cryptology-RYPTO'86 [C].Berlin:Springer-verlag Press,1987,200-212.
  • 9Camenisch J,Michels M.Proving in zero-knowledge that a Number is the Product of Two Safe Primes [R].RS-98-29,Australia:University of Wollongong,1998.
  • 10Lipmaa H.On Diophantine Complexity and statistical zeroknowledge arguments.Goos G,Hartmanis J,J van Leeuwen.ASIACRYPT 2003 [C].Berlin:Springer-Verlag Press,2003,398-415.

共引文献23

同被引文献16

  • 1郑重,薛万国,保鹏飞,傅效群.基于PKI的电子病历系统安全[J].医疗卫生装备,2005,26(6):28-30. 被引量:15
  • 2Shamir A.Identity--based Cryptosystems and signatureSchemes[C]//Proceedings of Crypto' 84.[S.1.]: Springer Verlag,1984:47-53.
  • 3Stallings W.密码编码学与网络安全[M].孟庆树,王丽娜,傅建明,译.4版.北京:电子工业出版社,2006.
  • 4BRANDS S A. Rethinking public key infrastructures and digital certificates building in privacy[M].Cambridge,ma:the Mit Press,2000.
  • 5SHAMIR A. Identity-based cryptosystems and signature schemes[A].Berlin:springer-verlag,1984.47-53.
  • 6BONEH D,FRANKLIN M. Identity-based encryption from the Weil pairing[J].SIAM Journal on Computing,2000,(03):586-615.
  • 7BONEH D,FRANKLIN M. Stanford IBE library[OL].http://crypto.stanford.edu/ibe/download/ibe0.7,2.tgz,2011.
  • 8Stanford University. PBC library[OL].http://crypto.stanford.edu/pbc/download.html,2011.
  • 9顾永跟,吴小红,柴震川.基于身份的电子医疗文书签名系统[J].湖州师范学院学报,2008,30(1):56-60. 被引量:2
  • 10刘连浩,屈步云.利用双线性映射构建高效身份认证方案[J].计算机应用,2009,29(7):1779-1781. 被引量:3

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部