计算机科学 ›› 2014, Vol. 41 ›› Issue (Z11): 272-276.
周才学,谭旭杰
ZHOU Cai-xue and TAN Xu-jie
摘要: 给出了基于证书的多代理多签名的形式化定义和安全模型,并提出一个不使用双线性对的具体方案。在随机预言机模型中,在椭圆曲线离散对数是困难问题的假设下,对方案进行了安全性证明。效率分析表明,方案具有较高的效率。
[1] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceeding of Crypto’84.LNCS 196,Berlin:Springer-Verlag,1984:47-53 [2] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]∥Proceeding of ASIACRYPT 2003.LNCS 2894,Berlin:Springer-Verlag,2003:452-473 [3] Gentry C.Certificate-based encryption and the certificate revocation problem[C]∥Proc.of EuroCrypt.Berlin:Springer-Verlag,2003:272-293 [4] Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1353 [5] Hwang S J,Chen C C.A New Multi-Proxy Multi-SignatureScheme[C]∥2001 National Computer Symposium:Information Security.Taiwan,2001:19-26 [6] Kang B G,Park J H,Hahn S G.A certificate-based signaturescheme[C]∥Proc.of CT-RSA.Berlin:Springer-Verlag,2004:99-111 [7] 陈辉焱,李巍,苏艳芳.一种基于证书的代理环签名方案[J].计算机工程,2012,38(16):149-152 [8] 韩春霞,王琳杰.基于证书的多重代理多重盲签名方案研究[J].长江大学学报:自然科学版,2013,10(19):61-64 [9] 翟正元,高德智,梁向前,等.新的基于证书的代理盲签名方案[J].计算机工程与应用,2014,0(4):57-62 [10] Boldyreva A,Palacio A,Warinschi B.Secure proxy signatureschemes for delegation of signing rights[J].Journal of cryptology,2012,25(1):57-115 [11] Wang Qin,Cao Zhen-fu.Security arguments for partial delegation with warrant proxy signature schemes[EB/OL].[2004-11-17].http://erpint.iacr.org/2004/315.pdf [12] Li Ji-guo,Huang Xin-yi,Mu Yi,et al.Certificate-based signature:security model and efficient construction[C]∥Proc.of EuroPKI’2007.2007:110-125 [13] Wu Wei,Mu Yi,Susilo W,et al.Certificate-based signatures revisited[J].Journal of universal computer science,2009,15(8):1659-1684 [14] Li Ji-guo,Xu Li-zhong,Zhang Yi-chen.Provably secure certificate-based proxy signature schemes[J].Journal of Computers,2009,4(6):444-452 [15] 陈江山.基于证书的代理签名和盲签名[D].漳州:漳州师范学院,2012 [16] Bellare M,Neven G.Multi-signatures in the plain public-keymodel and a general forking lemma[C]∥Proc of CCS’ 06.Alexandria:ACM,2006:390-399 [17] Tiwari N,Padhye S,He D.Efficient ID-based multiproxy multisignature without bilinear maps in ROM[J].Annals of telecommunications,2013,68(3-4):231-237 [18] Li Xiang-xue,Chen Ke-fei.ID-based multi-proxy signature,proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings[J].Appl Math Comput,2005(169):437-450 [19] Sahu R A,Padhye S.An ID-based multi-proxy multisignature scheme[C]∥Proceeding of IEEE international conference on computer & communication technology(ICCCT-2010).2010:60-63 |
No related articles found! |
|