计算机科学 ›› 2015, Vol. 42 ›› Issue (3): 132-135.doi: 10.11896/j.issn.1002-137X.2015.03.027
张亦辰,李继国,钱 娜
ZHANG Yi-chen, LI Ji-guo and QIAN Na
摘要: 无证书强指定验证者签名,能够很好地解决传统密码体制下强指定验证者签名证书管理复杂问题和基于身份密码体制下强指定验证者签名的密钥托管问题,因此研究无证书强指定验证者签名具有重要的理论意义。提出了一个无证书强指定验证者签名方案。基于CDH(Computational Diffie Hellman)问题和CBDH(Computational Bilinear Diffie-Hellman)问题困难假定,在随机预言模型下证明了该方案对自适应选择消息攻击是存在不可伪造的,分析表明该方案具有较小的计算代价和通信代价。
[1] Jakobsson M,Sako K,Impagliazzo R.Designated Verifier Proofs and Their Applications [C]∥Proceedings of the Eurocrypt’96.LNCS 1070,Berlin:Springer-Verlag,1996:143-154 [2] Saeednia S,Kramer S,Markowitch O.An Efficient Strong De-signated Verifier Signature Scheme [C]∥Proceedings of the 6th International Conference on Information Security and Cryptology2003.LNCS 2971,Berlin:Springer-Verlag,2004:40-54 [3] Huang X,Mu Y,Susilo W,et al.Short Designated VerifierProxy Signature from Pairings [C]∥The First International Work shop on Security in Ubiquitous Computing Systems.LNCS 3823,Berlin:Springer Verlag,2005:835-844 [4] Tso R,Okamoto T,Okamoto E.Practical Strong DesignatedVerifier Signature Schemes Based on Double Discrete Lo-garithms[C]∥CISC 2005.LNCS 3822,Berlin:Springer-Verlag,2005:113-127 [5] Huang Q,Yang G M,Wong D S,et al.Efficient Strong De-signated Verifier Signature Schemes without Random Oracle or with Non-delegatability [J].International Journal of Information Security,2011,10(6):373-385 [6] Susilo W,Zhang F,Mu Y.Identity-based Strong DesignatedVerifier Signature Schemes [C]∥Proceedings of the ACISP 2004.LNCS 3108,Berlin:Springer-Verlag,2004:313-324 [7] Huang X,Susilo W,Mu Y,et al.Short (Identity-Based) Strong Designated Verifier Signature Schemes [C]∥Proceedings of the ISPEC 2006.LNCS 3903,Berlin:Springer-Verlag,2006:214-225 [8] 王晓峰,张璟,王尚平,等.新的基于身份的广义指定验证者签名方案[J].电子学报,2007,35(8):1432-1436 [9] Zhang Jian-hong.A Novel ID-based Designated Verifier Signa-ture Scheme [J].Information Science,2008,178(3):766-773 [10] Yang Bo,Xiao Zi-bi,Hu Zheng-ming.A Secure ID-Based Strong Designated Verifier Signature Scheme [C]∥Proceedings of the IC-NIDC 2009.IEEE,2009:543-547 [11] Kang Bao-yuan.A Novel Identity-based Strong Designated Verifier Signature Scheme [J].Journal of Systems and Software,2009,82(2):270-273 [12] 张学军.高效的基于身份的指定验证者签名[J].计算机工程,2009,35(5):131-132 [13] 邵健,曹珍富,魏立斐.基于身份的强指定验证者签名方案 [J].计算机工程,2010,36(8):167-169 [14] Huang X,Susilo W,Mu Y,et al.Certificateless Designated Verifier Signature Schemes[C]∥Proceedings of the 20th International Conference on Advanced Information Networking and Applications 2006.IEEE,2006:15-19 [15] Chen Hu,Song Ru-shun,Zhang Fu-tai,et al.An Efficient Certi-ficateless Short Designated Verifier Signature Scheme [C]∥Proceedings of the Wireless Communications,Networking and Mobile Computing 2008.IEEE,2008:1-6 [16] Yang Bo,Hu Zheng-ming,Xiao Zi-bi.Efficient CertificatelessStrong Designated Verifier Signature Scheme [C]∥2009 International Conference on Computational Intelligence and Security.IEEE,2009:432-436 [17] Ming Yang,Shen Xiao-qin,Wang Yu-min.Certificateless Uni-versal Designated Verifier Signature Schemes [J].The Journal of China Universities of Posts and Telecommunications,2007,14(3):85-94 [18] 韩亚宁,王彩芬.无证书的广义指定多个验证者签名体制 [J].计算机应用研究,2009,26(6):2158-2161 [19] Miyaji A,Nakabayashi M,Takano S.New Explicit Conditions of Elliptic Curve Traces for FR-reduction [J].IEICE Trans.on Fundamentals,2002,E85-A(2):481-484 [20] Koblitz N,Menezes A.Pairing-based Cryptography at High Security Levels [C]∥Cryptography and Coding’2005.Berlin:Springer-Verlag,2005:13-36 [21] Chatterjee S,Hankerson D,Knapp E,et al.Comparing Two Pairing-based Aggregate Signature Schemes [J].Designs,Codes and Cryptography,2010,55(2/3):141-167 [22] Li Ji-guo,Teng Hui-yun,Huang Xin-yi,et al.A Forward-SecureCertificate-Based Signature Scheme in the Standand Model[J].The Computer Journal,2012,7672:362-376 [23] Li Ji-guo,Du Hai-ting,Zhang Yi-chen,et al.Provably SecureCertificate-based Key-Insulated Signature Scheme[J].Concurrency and Computation Practice and Experience,2014,26:1546-1560 [24] Naor M,Segev G.Public-key Cryptosystems Resilient to KeyLeakage [J].SIAM J.Comput,2010,41(4):772-814 |
No related articles found! |
|