期刊文献+

一类可证安全的基于证书盲签名 被引量:4

Provably secure certificate-based blind signature
下载PDF
导出
摘要 在强安全模型下,结合基于证书签名体制和盲签名体制,提出了一类高效的基于证书盲签名方案,能抵抗适应性选择消息攻击和身份攻击下的存在性伪造,并且在随机预言模型下基于q强Diffie-Hellman难题(q-SDHP)和扩展的逆计算Diffie-Hellman难题(E-inv-CDHP)给出完整的安全性证明。结果表明,新方案具有较高的安全性,不仅简化了密钥管理过程,克服了密钥托管问题,而且整体性能比较高。 Combining certificate-based signature and blind signature,this paper firstly proposed an efficient certificate-based blind signature scheme under a strong security model.The scheme was existentially unforgeable against adaptively chosen-message attack and chosen-identity attack.The complete security proof has been given under random oracle model.Its security was based on the q-strong Diffie-Hellman problem(q-SDHP) and the expand inversed Diffie-Hellman problem(E-inv-CDHP).The results show that the new scheme has a high degree of security.It not only simplifies the certificate management process,but also overcomes the private key escrow problem.Furthermore,its overall performance is relatively high.
出处 《计算机应用研究》 CSCD 北大核心 2012年第12期4622-4625,4630,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61170246) 福建省教育厅科技项目(JA10209)
关键词 基于证书盲签名 随机预言模型 q强Diffie-Hellman难题 扩展的逆计算Diffie-Hellman难题 certificate-based blind signature random oracle model q-strong Diffie-Hellman problem(q-SDHP) expand inversed Diffie-Hellman problem(E-inv-CDHP)
  • 相关文献

参考文献19

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [ C ]//Lecture Notes in Computer Science, Vol 196. Berlin : Springer- Verlag, 1984:47- 53.
  • 2AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography [ C ]//Lecture Notes in Computer Science, Vol 2894. Berlin : Springer-Verlag, 2003 : 452 - 473.
  • 3GENTRY C. Certificate-based encryption and the certificate revocation problem [ C ]//Lecture Notes in Computer Science, Vol 2656. Berlin: Springer-Verlag, 2003:272-293.
  • 4KANG B G, PARK J H, HAHN S G. A certificate-based signature scheme[ C ]//Lecture Notes in Computer Science, Vol 2964. Berlin:Springer-Verlag, 2004 : 99 - 111.
  • 5LI Ji-guo, HUANG Xin-yi, MU Yi,et al. Certificate-based signature: security model and efficient construction [ C ]//Lecture Notes in Computer Science, Vol 4582. Berlin : Springer-Verlag,2007 : 110-125.
  • 6LIU J K, BAEK J, SUSILO W, et al. Certificate-based signature schemes without pairings or random oracles [ C ]//Lecture Notes in Computer Science, Vol 5222. Berlin : Springer-Verlag, 2008:285-297.
  • 7WU Wei, MU Yi, SUSILO W, et al. Certificate-based signatures revisited [ J ]. Journal of Universal Computer Science, 2009,15 (8) :1659-1684.
  • 8HUANG Xin-yi, MU Yi, SUSILO W, et al. Certificateless signature revisited [ C ]//Lecture Notes in Computer Science, Vol 4586. Berlin : Springer-Verlag, 2007 : 308 - 322.
  • 9AU M H,LIU J K,SUSILO W,et al. Certificate based(linkable) ring signature [ C ]//Lecture Notes in Computer Science, Vol 4464. Berlin : Springer-Verlag, 2007:79 - 92.
  • 10WANG Li-hua, SHAO Jun, CAO Zhen-fu, et al. A certificate-based proxy cryptosystem with revocable proxy decryption power[ C ]//Lecture Notes in Computer Science, Vol 4859. Berlin: Springer-Verlag, 2007: 297- 311.

二级参考文献10

  • 1CHAUM D. Blind signature for untraceable payments[ C ]//Advances in Cryptology-CRYPTO. Berlin:Plenum Press, 1983 : 199-233.
  • 2SHAMIR A. Identity-based cryptosystems and signature schemes [ C]//Advances in Cryptology-CRYPT0. Heidelberg: Springer-Ver- lag,1984:47-53.
  • 3HUANG Zhen-jie, CHEN Ke-fei, WANG Yu-min. Efficient identity- based signatures and blind signatures [ C ]//Lecture Notes in Comput- er Science. Berlin: Springer-Verlag, 2005: 120-133.
  • 4ZHANG Fang-gno, KIM K. Efficient ID-based blind signature and proxy signature from bilinear pairings [ C 1//Lecture Notes in Comput- er Science. Berlin: Springer-Verlag, 2003: 312-323.
  • 5BARRETO P S L M, LIBERT B, MCCULLAGH N, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps [ C ]//Advances in Cryptology-ASIACRYPT. Berlin: Springer-Verlag, 2005: 515-532.
  • 6BONEH D, BOYEN X. Short signatures without random oracles [ C ]//Advances in Cryptology-EUROCRYPT. Berlin : Springer-Ver- lag, 2004:56-73.
  • 7闫东升.一个新的高效的基于身份的部分盲签名方案[J].计算机工程与应用,2008,44(2):137-139. 被引量:16
  • 8农强,郝艳华,黄茹芬.对一种高效部分盲签名方案的密码学分析及改进[J].云南师范大学学报(自然科学版),2010,30(1):32-35. 被引量:4
  • 9冯涛,彭伟,马建峰.安全的无可信PKG的部分盲签名方案[J].通信学报,2010,31(1):128-134. 被引量:13
  • 10万丽,李方伟,闫少军.基于改进椭圆曲线数字签名的盲签名[J].计算机应用研究,2011,28(3):1152-1154. 被引量:3

共引文献6

同被引文献71

  • 1Shamir A.Identity-based cryptosystems and signature schemes[C]// LNCS 196 : CRYPTO 1984.Berlin: Springer-Verlag, 1985 : 47-53.
  • 2Gentry C.Certificate-based encryption and the certificate revo- cation problem[C]//LNCS 2656: EUROCRPYT 2003.Berlin: Springer-Verlag, 2003 : 272-293.
  • 3Kang B G, Park J H, Hahn S G.A certificate-based signature scheme[C]//LNCS 2964: CT-RSA 2004.Berlin: Springer-Verlag, 2004-99-111.
  • 4Li J, Huang X, Mu Y, et al.Certificate-based signature: security model and efficient construction[C]//LNCS 4582:EuroPKI' 07. Berlin: Springer, 2007: 110-125.
  • 5Liu K, Baek J, Susilo W, et al.Certificate-based signature schemes without pairings or random oracles[EB/OL].[2013-03-10]. http://eprint.iacr.org/.
  • 6Wu Wei, Mu Yi, Susilo W, et al.Certificate-based signatures revisited[J].Joumal of Universal Computer Science,2009, 15 (8) : 1659-1684.
  • 7Li J G, Huang X Y, Zhang Y C.An efficient short certifi- cate-based signature scheme[J].Joumal of Systems and Soft- ware, 2012,85 (2) : 314-322.
  • 8Huang Rufen, Nong Qiang.A new efficient certificate-based signature scheme without bilinear pairings[C]//LNIT 31,2012 : 101-108.
  • 9Girault M.Self-certified public keys[C]//LNCS 547: Euro- crypt 1991.Berlin:Springer-Verlag, 1991:490-497.
  • 10Liu J, Au M, Susilo W.Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model[C]//ACM ASIACCS' 07.New York: ACM Press',2007:273-283.

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部