期刊文献+

高效的可撤销无证书签名方案 被引量:4

Efficient Revocable Certificateless Signature Scheme
下载PDF
导出
摘要 在使用安全媒介(SEM)实现无证书签名撤销时,SEM存储了大量用户的秘密信息,降低了签名方案的安全性和可靠性。为此,根据时间更新密钥的思想,设计一种新的可撤销无证书签名方案。在随机预言模型下,基于CDH困难问题,证明方案的安全性,并可抵抗一般用户的公钥替换攻击、密钥生成中心攻击和已撤销用户攻击。分析结果表明,该方案只需要3个双线性对运算,具有较高的运算效率。 Using Security Mediator(SEM) to realize the revocation of certificateless signature, SEM stores a lot of users' secret information,and reduces the security and reliability of certificateless signature scheme. In order to overcome this shortcoming,this paper proposes an efficiently Revocable Certificateless Signature(RCLS) scheme based on the idea of time update key. In the random oracle model, based on the assumption of Computational Differ-Hellman(CDH) problem, the scheme which is proved to be secure can resist three types of attacks : the attack of user' s replace public key, the attack of Key Generation Center(KGC) and the attack of revocatory users. Analysis results show that this scheme has great computation efficiency as it only needs 3 bilinear pairing computation.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第7期157-162,共6页 Computer Engineering
基金 国家自然科学基金资助项目(61262057 61163038 61262056) 甘肃省高等学校科研基金资助项目(2013A-014) 西北师范大学青年教师科研能力提升计划基金资助项目(NWNU-LKQN-12-32)
关键词 无证书签名 用户撤销机制 时间更新密钥 随机预言模型 不可伪造性 certificateless signature user revocable mechanism time update key random oracle model unforgeability
  • 相关文献

参考文献12

  • 1Al-Riyami S S,Paterson K.Certificateless Public Key Cryptography[C]//Proceedings of ASIACRYPT’03.Berlin,Germany:Springer-Verlag,2003:452-473.
  • 2张福泰,孙银霞,张磊,耿曼曼,李素娟.无证书公钥密码体制研究[J].软件学报,2011,22(6):1316-1332. 被引量:52
  • 3Huang Xinyi,Mu Yi,Willy S,et al.Certificateless Signatures:New Schemes and Security Models[J].The Computer Journal,2012,55(4):457-474.
  • 4曹素珍,王彩芬,程文华,张玉磊.一种高效的无证书聚合签名方案[J].计算机工程,2011,37(18):157-159. 被引量:4
  • 5杜红珍,黄梅娟,温巧燕.高效的可证明安全的无证书聚合签名方案[J].电子学报,2013,41(1):72-76. 被引量:38
  • 6秦艳琳,吴晓平.高效的无证书有序多重签名方案[J].通信学报,2013,34(7):105-110. 被引量:16
  • 7Du Hongzhen,Wen Qiaoyan.Certificateless Proxy Multi-signature[J].Information Sciences,2014,276:21-30.
  • 8Wang Boyang,Li Baochun,Li Hui,et al.Certificateless Public Auditing for Data Integrity in the Cloud[C]//Proceedings of IEEE Conference on Communications and Netw ork Security.Washington D.C.,USA:IEEE Press,2013:136-144.
  • 9Ju Hak-Soo,Kim D Y,Lee D H,et al.Efficient Revocation of Security Capability in Certificateless Public Key Cryptography[C]//Proceedings of KES’05.Berlin,Germany:Springer-Verlag,2005:453-459.
  • 10Yap W S,Sherman S MC,Heng Swee-Huay,et al.Security Mediated Certicateless Signatures[C]//Proceedings of ACNS’07.Berlin,Germany:Springer-Verlag,2007:459-477.

二级参考文献37

  • 1Cheng Xiangguo,Liu Jingmei,Guo Lifeng,Wang Xinmei.IDENTITY-BASED MULTISIGNATURE AND AGGREGATE SIGNATURE SCHEMES FROM M-TORSION GROUPS[J].Journal of Electronics(China),2006,23(4):569-573. 被引量:11
  • 2CAO Chunjie,MA Jianfeng,MOON Sangjae.Provable Efficient Certificateless Group Key Exchange Protocol[J].Wuhan University Journal of Natural Sciences,2007,12(1):41-45. 被引量:8
  • 3李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 4Dan B, Craig G, Ben L, et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps[C]//Proc. of the International Con- ference on the Theory and Applications of Cryptographic Tech- niques. Warsaw, Poland: [s. n.], 2003.
  • 5Craig G, Zulfikar R. Identity-based Aggregate Signatures[C]//Proc. of PKC’06. New York, USA: [s. n.], 2006.
  • 6Zheng Gong, Yu Long, Xuan Hong, et al. Two Certificateless Aggregate Signatures from Bilinear Maps[C]//Proc. of SNPD’07. Qingdao, China: IEEE Press, 2007.
  • 7Zhang Lei, Zhang Futai. A New Certificateless Aggregate Signature Scheme[J]. Computer Communications, 2009, 32(6): 1079-1085.
  • 8Hu B C, Wong D S, Zhang Zhenfeng, et al. Key Replacement Attack Against a Generic Construction of Certificateless Sig- nature[C]//Proc. of the ACISP’06. Melbourne, Australia: [s. n.], 2006.
  • 9HARN L, and REN J. Efficient identity-based RSA multisignatures[J]. Computers & Security, 2010, 27(3): 12-15.
  • 10WANG B, YANG X D, YANG G. An identity-based multisignaturc scheme from the weil pairing[A]. Proceedings of the 2010 Interna- tional Conference on Computer Design And Applications (ICCDA 2010)[C]. Qinhuangdao, China, 2010.

共引文献98

同被引文献22

  • 1Shamir A. Identity-based Cryptosystems And Signature Schemes ~ C ~//Proceedings of Cryptology-Crypto ' 84. Washington D. C., USA : IEEE Press, 1984:47-53.
  • 2AI-Riyami S S,Paterson K G. Certificateless Public Key Cryptography ~ C 1//Proceedings of ASIACRYPT ' 03. B erlin, Germany : Springer, 2003 : 452-473.
  • 3Harn L, Ren J, Lin C L. Design of DL-based Certificateless Digital Signatures I J ]. Journal of Systems and Software, 2009,82 ( 5 ) : 789-793.
  • 4Gong Peng, Li Ping. Further Improvement of a Certificateless Signature Scheme Without Pairing [ J ]. International Journal of Communication Systems, 2012, 27(10) :2083-2091.
  • 5Yeh Kuo-hui, Tsai Kuo-yu, Kuo Ren-zong, et al. Robust Certificateless Signature Scheme Without Bilinear Pai- rings[C]//Proceedings of 2013 International Conference on IT Convergence and Security. Washington D. C.,USA: IEEE Press ,2013 : 1-4.
  • 6Zhang Jianhong, Mao J. An Efficient RSA-based Certifi- careless Signature Scheme [ J ]. Journal of Systems and Software ,2012,85 ( 3 ) :638-642.
  • 7Kim Kee-sung, Jeong Ik-rae. A New Certificateless Signature Scheme Under Enhanced Security Models~ Jl. Security and Communication Networks, 2014, 8 ( 5 ) : 801-810.
  • 8Yuan Yumin, Wang Chenhui. Certificateless Signature Scheme with Security Enhanced in the Standard Model I J ]. Information Processing Letters ,2014,114 ( 9 ) : 492499.
  • 9Huang Xinyi, Mu Yi, Susilo W, et al. Certificateless Signature Revisited ~ C ~//Proceedings of the 12th Australasian Conference on Information Security and Privacy. Washington D. C., USA: IEEE Press, 2007: 308-322.
  • 10张磊,张福泰.一类无证书签名方案的构造方法[J].计算机学报,2009,32(5):940-945. 被引量:44

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部