计算机科学 ›› 2016, Vol. 43 ›› Issue (4): 50-52.doi: 10.11896/j.issn.1002-137X.2016.04.010

• 2015年全国理论计算机科学学术年会 • 上一篇    下一篇

一个安全的基于身份的强指定验证者签名方案

徐丹慧,亢保元   

  1. 天津工业大学计算机科学与软件学院 天津300387,天津工业大学计算机科学与软件学院 天津300387
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受天津市应用基础与前沿技术研究计划项目(15JCYBJC15900)资助

Secure Identity-based Strong Designated Verifier Signature Scheme

XU Dan-hui and KANG Bao-yuan   

  • Online:2018-12-01 Published:2018-12-01

摘要: 在一般的数字签名中,拥有签名者公钥的任何人都可以验证该签名的有效性;而强指定验证者签名是由签名者指定一个验证者,在签名验证阶段,只有这个指定验证者可以验证该签名的有效性,其他人都不能验证该签名。这是因为在签名的验证阶段必须用到指定验证者的私钥。基于这个性质,强指定验证者签名被广泛应用于电子商务、网上投标、电子选举中。基于双线性对提出了一个新的基于身份的强指定验证者签名方案,并基于GBDH困难问题假设,采用密码学上安全性分析的方法,证明了该方案在适应性选择消息和选择身份攻击下是不可伪造的。最后,分析了方案的计算成本,结果表明该方案具有较高的效率。

关键词: 密码学,基于身份的签名,指定验证者签名,双线性对

Abstract: Compared with ordinary digital signature in which anyone who owns the signer’s public key can verify the validity of the signature,a designated verifier signature scheme makes it possible for a signer to convince a designated verifier that he has signed a message in such a way that the designated verifier cannot transfer the signature to a third party.In a strong designated verifier signature scheme,no third party can even verify the validity of a designated verifier signature,since the designated verifier’s private key is required in the verifying phase,such that strong designated verifier signature is widely used in electronic commerce,online bidding and electronic elections.Based on bilinear pairing we proposed a novel identity-based strong designated verifier signature scheme.Based on the GBDH assumption,we proved that our scheme is existentially against adaptive chosen message attack.Through the analysis of the computational cost,results show that the scheme has high efficiency.

Key words: Cryptography,Identity-based signature,Designated verifier signature,Bilinear pairing

[1] Jakobsson M,Sako K,Impagliazzo R.Designated verifier proofs and their applications[M]∥Advances in Cryptology(EUROCRYPT’96).Springer Berlin Heidelberg,1996:143-154
[2] Saeednia S,Kremer S,Markowitch O.An efficient strong designated verifier signature scheme[M]∥Information Security and Cryptology(ICISC 2003).Springer Berlin Heidelberg,2004:40-54
[3] Susilo W,Zhang F,Mu Y.Identity-based strong designated verifier signature schemes[M]∥Information Security and Privacy.Springer Berlin Heidelberg,2004:313-324
[4] Kancharla P K,Gummadidala S,Saxena A.Identity based strong designated verifier signature scheme[J].Informatica,2007,18(2):239-252
[5] Kang B,Boyd C,Dawson E.Identity-based strong designatedverifier signature schemes:attacks and new construction[J].Computers & Electrical Engineering,2009,35(1):49-53
[6] Kang B,Boyd C,Dawson E D.A novel identity-based strong designated verifier signature scheme[J].Journal of Systems and Software,2009,82(2):270-273
[7] Zhang J,Mao J.A novel ID-based designated verifier signature scheme[J].Information Sciences,2008,178(3):766-773
[8] Islam S H,Biswas G P.An efficient and secure strong designa-ted verifier signature scheme without bilinear pairings[J].J.Appl.Math.Info,2013,31(3/4):425-441
[9] Tang F,Lin C,Li Y,et al.Identity-based strong designated verifier signature scheme with full non-delegatability[C]∥2011 IEEE 10th International Conference on Trust,Security and Privacy in Computing and Communications (TrustCom).IEEE,2011:800-805
[10] Tian H,Chen X,Zhang F,et al.A non-delegatable strong designated verifier signature in ID-based setting for mobile environment[J].Mathematical and Computer Modelling,2013,58(5):1289-1300
[11] Hafizul I S K,Biswas G P.Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings[J].Journal of King Saud University-Computer and Information Sciences,2013,25(1):51-61
[12] Schnorr C P.Efficient signature generation by smart cards[J].Journal of Cryptology,1991,4(3):161-174
[13] Joux A.A one round protocol for tripartite Diffie-Hellman[M]∥Algorithmic Number Theory.Springer Berlin Heidelberg,2000:385-393
[14] Smart N P.Identity-based authenticated key agreement protocol based on Weil pairing[J].Electronics Letters,2002,38(13):630-632

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!