期刊文献+

基于可编程hash函数的短签名 被引量:2

Short signature based on programmable hash functions
原文传递
导出
摘要 数字签名中的短签名由于其签名长度的优势,特别适用于通信带宽受限的场合,现有的短签名方案大多是随机预言模型下可证明安全的,但是随机预言模型通常被认为过于理想化,现实中没有一种hash函数能够模拟随机预言模型,而少数标准模型下可证安全的短签名方案,一般被认为是低效的或者基于强困难假设,即攻击者被给于一定数量的随机的已解决问题实例,要求去解决一个它自己选择的实例.可编程hash函数(programmable hash functions,PHF)是一种能模拟随机预言的某些可编程特性的特殊hash函数.可编程hash函数可嵌入到签名的基本构造中,产生标准模型下的短签名.本文利用可编程hash函数设计了一个基于因子分解假设的短签名方案,它具有的优点是:1)签名长度短,只需要一个群上的元素和一个小整数;2)签名和验证计算量小,不需要在签名过程中进行生成素数的运算;3)不需要嵌入变色龙hash函数便可实现标准模型下可证明安全. A short signature, which is a type of digital signature, has an advantage in terms of its length, Short signatures are particularly suitable for scenarios in which communication bandwidth is constrained. Most of the existing short signature schemes have been proven secure under a random oracle, which is considered to be too idealistic. There is no hash function that can simulate a random oracle. A few of the provable secure short signature schemes in the standard model are considered to be inefficient or subject to strong hard assumptions, where the attacker is required to solve a chosen instance given a certain number of solved instances. Programmable hash functions (PHFs) can mimic some of the programmability properties of random oracles. Thus, PHFs can be plugged into the generic construction of signatures to yield short signatures in the standard model. We propose a short signature scheme based on a factoring assumption that uses programmable hash functions, The advantages are that: 1) the short signature only involves one element in a group and one small integer; 2) the scheme is efficient in terms of computational cost and does not require the generation of primes at signing; and 3) it is provably secure under the standard model without Chameleon hashes. This scheme is especially suitable for resource constrained applications such as wireless sensor networks and the Internet of things.
作者 王志伟
出处 《中国科学:信息科学》 CSCD 2013年第3期335-342,共8页 Scientia Sinica(Informationis)
基金 国家自然科学基金(批准号:61272422 61202353) 江苏高校优势学科建设工程(批准号:yx002001) 江苏省高校自然科学基金(批准号:11KJB520015)资助项目
关键词 短签名 密码学 因子分解假设 可编程hash函数 可证明安全 short signature, cryptography, factoring assumption, programmable hash functions, provable secu-rity
  • 相关文献

参考文献14

  • 1Diffie Z, Hellman M E. New directions in cryptography. IEEE Trans Inf Theory, 1976, 22: 644-654.
  • 2Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public key cryptosystem. Commun ACM, 1988, 21: 120-126.
  • 3Bellare M, Rogaway P. The exact security of digital signatures: How to sign with RSA and Rabin. In: Maurer U M, ed. Advances in Cryptology-EUROCRYPT’96, Saragossa, 1996. LNCS 1070. Berlin: Springer. 399-416.
  • 4Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In: Boyd C, ed. Advances in Cryptology - ASIACRYPT 2001, Gold Coast, 2001. LNCS 2248. Berlin: Springer. 514-532.
  • 5Bellare M, Ristenpart T. Simulation without the artificial abort: Simplified proof and improved concrete security for Waters’ IBE scheme. In: Joux A, ed. EUROCRYPT, 2009. LNCS 5479. Berlin: Springer. 407-424.
  • 6Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited (preliminary version). In: 30th Annual ACM Symposium on Theory of Computing, Dallas, 1998. 209-218.
  • 7Fischlin M. The Cramer-Shoup strong-RSA signature scheme revisited. In: Desmedt Y, ed. 6th InternationalWorkshop on Theory and Practice in Public Key Cryptography, Miami, 2003. LNCS 2567. Berlin: Springer. 116-129.
  • 8Cramer R, Shoup V. Signature schemes based on the strong RSA assumption. In: 6th Conference on Computer and Communications Security (ACM CCS), Singapore, 1999. 46-51.
  • 9Hofheinz D, Kiltz E. Programmable hash functions and their applications. In: Wagner D, ed. Advances in Cryptology (CRYPTO), Santa Barbara, 2008. LNCS 5157. Berlin: Springer. 21-38.
  • 10Hofheinz D, Kiltz E. Programmable hash functions and their applications. J Cryptol, 2011.

同被引文献14

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部