计算机科学 ›› 2015, Vol. 42 ›› Issue (3): 132-135.doi: 10.11896/j.issn.1002-137X.2015.03.027

• 信息安全 • 上一篇    下一篇

无证书强指定验证者签名方案

张亦辰,李继国,钱 娜   

  1. 河海大学计算机与信息学院 南京211100,河海大学计算机与信息学院 南京211100,河海大学计算机与信息学院 南京211100
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(61272542),河海大学中央高校基本科研业务费专项资金项目(2013B07014)资助

Certificateless Strong Designated Verifier Signature Scheme

ZHANG Yi-chen, LI Ji-guo and QIAN Na   

  • Online:2018-11-14 Published:2018-11-14

摘要: 无证书强指定验证者签名,能够很好地解决传统密码体制下强指定验证者签名证书管理复杂问题和基于身份密码体制下强指定验证者签名的密钥托管问题,因此研究无证书强指定验证者签名具有重要的理论意义。提出了一个无证书强指定验证者签名方案。基于CDH(Computational Diffie Hellman)问题和CBDH(Computational Bilinear Diffie-Hellman)问题困难假定,在随机预言模型下证明了该方案对自适应选择消息攻击是存在不可伪造的,分析表明该方案具有较小的计算代价和通信代价。

关键词: 公钥密码学,无证书签名,强指定验证者签名,CBDH问题,CDH问题

Abstract: It has great academic significance to research certificateless strong designated verifier signature(CLSDVS) that can solve the certificate management complexity problem in traditional public key cryptosystem and key escrow problem in identity-based public key cryptosystem.We constructed a CLSDVS scheme and proved that our scheme is existentially unforgeable against adaptive chosen message attack under the assumption of the computational bilinear Diffie-Hellman problem and computational Diffie-Hellman problem in the random oracle model.Then,we analyzed the computation cost and communication cost of our scheme.

Key words: Public key cryptography,Certificateless signature,Strong designated verifier signature,CBDH problem,CDH problem

[1] Jakobsson M,Sako K,Impagliazzo R.Designated Verifier Proofs and Their Applications [C]∥Proceedings of the Eurocrypt’96.LNCS 1070,Berlin:Springer-Verlag,1996:143-154
[2] Saeednia S,Kramer S,Markowitch O.An Efficient Strong De-signated Verifier Signature Scheme [C]∥Proceedings of the 6th International Conference on Information Security and Cryptology2003.LNCS 2971,Berlin:Springer-Verlag,2004:40-54
[3] Huang X,Mu Y,Susilo W,et al.Short Designated VerifierProxy Signature from Pairings [C]∥The First International Work shop on Security in Ubiquitous Computing Systems.LNCS 3823,Berlin:Springer Verlag,2005:835-844
[4] Tso R,Okamoto T,Okamoto E.Practical Strong DesignatedVerifier Signature Schemes Based on Double Discrete Lo-garithms[C]∥CISC 2005.LNCS 3822,Berlin:Springer-Verlag,2005:113-127
[5] Huang Q,Yang G M,Wong D S,et al.Efficient Strong De-signated Verifier Signature Schemes without Random Oracle or with Non-delegatability [J].International Journal of Information Security,2011,10(6):373-385
[6] Susilo W,Zhang F,Mu Y.Identity-based Strong DesignatedVerifier Signature Schemes [C]∥Proceedings of the ACISP 2004.LNCS 3108,Berlin:Springer-Verlag,2004:313-324
[7] Huang X,Susilo W,Mu Y,et al.Short (Identity-Based) Strong Designated Verifier Signature Schemes [C]∥Proceedings of the ISPEC 2006.LNCS 3903,Berlin:Springer-Verlag,2006:214-225
[8] 王晓峰,张璟,王尚平,等.新的基于身份的广义指定验证者签名方案[J].电子学报,2007,35(8):1432-1436
[9] Zhang Jian-hong.A Novel ID-based Designated Verifier Signa-ture Scheme [J].Information Science,2008,178(3):766-773
[10] Yang Bo,Xiao Zi-bi,Hu Zheng-ming.A Secure ID-Based Strong Designated Verifier Signature Scheme [C]∥Proceedings of the IC-NIDC 2009.IEEE,2009:543-547
[11] Kang Bao-yuan.A Novel Identity-based Strong Designated Verifier Signature Scheme [J].Journal of Systems and Software,2009,82(2):270-273
[12] 张学军.高效的基于身份的指定验证者签名[J].计算机工程,2009,35(5):131-132
[13] 邵健,曹珍富,魏立斐.基于身份的强指定验证者签名方案 [J].计算机工程,2010,36(8):167-169
[14] Huang X,Susilo W,Mu Y,et al.Certificateless Designated Verifier Signature Schemes[C]∥Proceedings of the 20th International Conference on Advanced Information Networking and Applications 2006.IEEE,2006:15-19
[15] Chen Hu,Song Ru-shun,Zhang Fu-tai,et al.An Efficient Certi-ficateless Short Designated Verifier Signature Scheme [C]∥Proceedings of the Wireless Communications,Networking and Mobile Computing 2008.IEEE,2008:1-6
[16] Yang Bo,Hu Zheng-ming,Xiao Zi-bi.Efficient CertificatelessStrong Designated Verifier Signature Scheme [C]∥2009 International Conference on Computational Intelligence and Security.IEEE,2009:432-436
[17] Ming Yang,Shen Xiao-qin,Wang Yu-min.Certificateless Uni-versal Designated Verifier Signature Schemes [J].The Journal of China Universities of Posts and Telecommunications,2007,14(3):85-94
[18] 韩亚宁,王彩芬.无证书的广义指定多个验证者签名体制 [J].计算机应用研究,2009,26(6):2158-2161
[19] Miyaji A,Nakabayashi M,Takano S.New Explicit Conditions of Elliptic Curve Traces for FR-reduction [J].IEICE Trans.on Fundamentals,2002,E85-A(2):481-484
[20] Koblitz N,Menezes A.Pairing-based Cryptography at High Security Levels [C]∥Cryptography and Coding’2005.Berlin:Springer-Verlag,2005:13-36
[21] Chatterjee S,Hankerson D,Knapp E,et al.Comparing Two Pairing-based Aggregate Signature Schemes [J].Designs,Codes and Cryptography,2010,55(2/3):141-167
[22] Li Ji-guo,Teng Hui-yun,Huang Xin-yi,et al.A Forward-SecureCertificate-Based Signature Scheme in the Standand Model[J].The Computer Journal,2012,7672:362-376
[23] Li Ji-guo,Du Hai-ting,Zhang Yi-chen,et al.Provably SecureCertificate-based Key-Insulated Signature Scheme[J].Concurrency and Computation Practice and Experience,2014,26:1546-1560
[24] Naor M,Segev G.Public-key Cryptosystems Resilient to KeyLeakage [J].SIAM J.Comput,2010,41(4):772-814

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!