期刊文献+

强不可伪造的在线/离线签名方案 被引量:1

On-line/off-line signature scheme with strong unforgeability
下载PDF
导出
摘要 针对标准模型下签名方案效率低的问题,利用目标抗碰撞杂凑函数和变色龙哈希函数,提出了一种在线/离线签名方案。在签名消息到来之前,离线阶段进行重签名的大部分计算,并将这些运算结果保存起来;在签名消息到来时,利用离线阶段保存的数据能在很短的时间内生成消息的在线重签名。在标准模型下,证明了新方案在适应性选择消息攻击下满足强不可伪造性。分析结果表明,新方案在效率上优于已有的标准模型下签名方案,在线签名算法仅需要1次模减法运算和1次模乘法运算,适合于计算能力较弱的低端计算设备。 To resolve the problem of low efficiency of the existing signature schemes in the standard model, an on-line/ off-line signature scheme is proposed by using chameleon hash function and target collision-resistant hash function. Most of the computations are performed in the off-line phase before seeing the message to be signed. The results of this precomputation are saved and then used in the on-line phase when the message must be signed. Moreover, the proposed signature scheme is provably secure against strong forgery under adaptive chosen message attacks. Compared with the existing signature schemes in the standard model, the new scheme is more efficient in the computational cost. It needs one modular subtraction computation and one modular multiplication computation in the on-line re-signing generation algorithm. The proposed scheme is suitable for low-power devices when computing power is weak.
出处 《计算机工程与应用》 CSCD 北大核心 2016年第3期81-84,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.61262057 No.61163038) 甘肃省科技计划(No.145RJDA325) 国家档案局科技项目计划(No.2014-X-33) 甘肃省自然科学基金(No.1308RJYA039) 兰州市科技计划项目(No.2013-4-22) 西北师范大学青年教师科研能力提升计划基金资助项目(No.NWNU-LKQN-12-23)
关键词 在线/离线签名 强不可伪造性 变色龙哈希函数 目标抗碰撞杂凑函数 on-line/off-line signature strong unforgeability chameleon hash function target collision-resistant hash function
  • 相关文献

参考文献14

  • 1Canetti R,Goldreich O,Halevi S.The random oracle methodology,revisited[C]//STOC98,1998:209-218.
  • 2夏昂,张龙军.一种新的无双线性对的无证书安全签密方案[J].计算机应用研究,2014,31(2):532-535. 被引量:8
  • 3Waters B.Efficient identity-based encryption without random oracles[C]//Proceedings of Euro Crypt,2005:114-127.
  • 4Shamir A,Tauman Y.Improved online/offline signature schemes[C]//Proceedings of CRYPTO 2001.Berlin Heidelberg:Springer,2001:355-367.
  • 5Kurosawa K,Schmidt-Samoa K.New online/offline signature without random oracles[C]//Proceedings of PKC 2006,New York,NY,USA,2006:330-346.
  • 6Marc J.An efficient on-line/off-line signature scheme without random oracles[C]//LNCS 5339:Proceedings of CANS’08.Heidelberg:Springer,2008:98-107.
  • 7Liu J K,Baek J,Zhou J,et al.Efficient online/offline identity-based signature for wireless sensor network[J].International Journal of Information Security,2010,9(4):287-296.
  • 8Matsuda T,Attrapadung N,Hanaoka G,et al.A CDHbased strongly unforgeable signature without collision resistant Hash function[C]//Proceedings of Prov Sec 2007,2007:68-84.
  • 9张江霄,郭华,李舟军.基于逆序二叉树的高效可分电子现金系统[J].电子与信息学报,2014,36(1):22-26. 被引量:4
  • 10张延红,陈明.标准模型下增强的基于身份部分盲签名[J].四川大学学报(工程科学版),2014,46(1):95-101. 被引量:8

二级参考文献58

  • 1Mambo M, Usuda K, Okamoto E. Proxy signatures for del- egating signing operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York: ACM, 1996:48-57.
  • 2Kim S, Park S,Won D. Proxy signatures, revisited[C]//In- formation and Communications Security. Beijing:Yongfei Han, 1997:223-232.
  • 3Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: a new type of proxy signature scheme[J]. Electronics Letters, 2000, 36(6) :527-528.
  • 4Shamir A. Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology. Berlin: Springer Ber- lin Heidelberg, 1984:47 -53.
  • 5ZhangF, Kim K. Efficient IYbased blind signature and proxy signature from bilinear pairings [C]//Information Se- curity and Privacy. Berlin: Springer Berlin Heidelberg, 2003 : 312-323.
  • 6Wu W, Mu Y, Susilo W, et al. Identity-based proxy signa- ture from pairings [C]//Proeeedings of the 4th International Conference on Autonomic and Trusted Computing. Berlin: Springer Berlin Heidelberg, 2007 : 22-31.
  • 7Lee B, Kim H, Kim K. Secure mobile agent using strong non designated proxy signature [C]//Information Security and Privacy. Berlin: Springer Berlin Heidelberg, 2001: 474- 486.
  • 8Lee B, Kim H, Kim K. Strong Proxy Signature and its Ap- plication [CJ//Proeeedings of SCIS 2001. Berlin: Springer Berlin Heidelberg, 2001:603 -608.
  • 9Goldwasser S, Micali S, Rivest R L. A digital signaturescheme secure against adaptive chosen-messages attacks[J]. SIAM Journal on Computing, 1988,17(2) : 281-308.
  • 10Waters B. Efficient identity-based encryption withoutrandom oracles [C] // Proceedings of the Advances inCryptology-EUROCRYPT 2005. Berlin : Springer-Ver-lag, 2005: 114-127.

共引文献22

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部