摘要: 可净化签名方案中,净化者能够修改原消息的特定部分,不必与签名者交互就能生成修改消息的有效签名。利用双线性对,基于Waters技术和Li技术,提出一个标准模型下安全的基于身份可净化签名方案。安全性分析表明,所提方案能够满足不可伪造性、不可区分性和不可变性。和现有标准模型下安全方案相比,该方案计算效率高、通信代价小。
[1] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceedings of Crypto 1984.New York:Springer-Verlag,1984:47-53 [2] Boneh D,Franklin M.Identity-based encryption from the Weil pairing[C]∥Proceedings of Crypto 2001.LNCS 2139.London:Springer-Verlag,2001:213-229 [3] Paterson K G.ID-based signatures from pairings on ellipticcurves[J].IEEE Comunication Letter,2002,38(18) [4] Cha J C,Cheon J H.An identity-based signature from gap Diffie-Hellman groups[C]∥Proceeding of LNCS.Heidelberg:Springer-Verlag,2003:18-30 [5] Hess F.Efficient identity based signature schemes based onpairings[C]∥Proceeding of LNCS.Heidelberg:Springer-Verlag,2003:310-324 [6] Paterson K G,Schuldt J C N.Efficient identity-based signatures secure in the standard model[C]∥Proceedings of the 11th Australasian Conferece on Information Security and Privacy.Berlin/Heidelberg:Springer-Velag,2006:207-222 [7] Miyazaki K,Susaki S,Iwamura M,et al.Digital documents sanitizing problem[J].IEICE Technical Report,2003,3:61-67 [8] Steinfeld R,Bull L,Zheng Y.Content extraction signatures[C]∥Proceeding of Information Security and Cryptology-ICISC.Berlin:Springer-Verlag,2001:285-304 [9] Ateniese G,Chou D H,de Medeiros B,et al.Sanitizable signatures[C]∥Proceeding of Computer Security-ESORICS.Berlin:Springer-Verlag,2005:159-177 [10] Lonowskim M,Lauks A.Extended sanitizable signatures[C]∥Proceeding of Information Security and Cryptology-ICISC.Berlin:Springer-Verlag,2006:343-355 [11] Canard S,Laguillaumie F,Milhau M.Trapdoor sanitizable signatures and their application to content protection[C]∥Procee-dings of Applied Cryptography and Network Security.Berlin:Springer-Verlag,2008:258-276 [12] Brzuska C,Fischlin M,Freudenreich T,et al.Security of sanitiza-ble signatures revisited[C]∥Proceedings of Public Key Cryptography-PKC.Berlin:Springer-Verlag,2009:317-336 [13] Brzuskac,Fischlinm,Lehmanna,et al.Sanitizable signatures:how to partially delegate control for authenticated data[C]∥Proceedings of Special Interest Group on Biometrics and Electronic Signatures.Bonn:GI,2009:117-128 [14] Brzuskac,Fischlinm,Lehmanna,et al.Unlinkability of sanitiza-ble signatures[C]∥Proceedings of Public-Key Cryptography-PKC.Berlin:Springer-Verlag,2010:444-461 [15] Ming Yang,Shen Xiao-qin,Peng Ya-mian.Identity-Based Sani-tizable Signature Scheme in the Standard Model[C]∥Procee-dings of International Conference on Intormation Computing and Application.Berlin/Heidelberg:Springer-Verlag 2010:9-16 [16] Waters B.Efficient identity-based encryption without randomoracles[C]∥Proceedings of Eurocrypt.Berlin/Heidelberg:Springer-Verlag,2005:114-127 [17] 李继国,姜平进.标准模型下可证安全的基于身份的高效签名方案[J].计算机学报,2009(11):2130-2136 |
No related articles found! |
|