计算机科学 ›› 2014, Vol. 41 ›› Issue (Z11): 272-276.

• 信息安全 • 上一篇    下一篇

基于证书的多代理多签名

周才学,谭旭杰   

  1. 九江学院信息科学与技术学院 九江332005;九江学院信息科学与技术学院 九江332005
  • 出版日期:2018-11-14 发布日期:2018-11-14

Certificate-based Multi-proxy Multi-signature Scheme

ZHOU Cai-xue and TAN Xu-jie   

  • Online:2018-11-14 Published:2018-11-14

摘要: 给出了基于证书的多代理多签名的形式化定义和安全模型,并提出一个不使用双线性对的具体方案。在随机预言机模型中,在椭圆曲线离散对数是困难问题的假设下,对方案进行了安全性证明。效率分析表明,方案具有较高的效率。

关键词: 基于证书的多代理多签名,随机预言机模型,公钥替换攻击,双线性对

Abstract: This paper gave out a formal definition and security notions of certificate-based multi-proxy multi-signature schemes,and proposed a concrete scheme without using bilinear pairings.It was proved to be existentially unforgeable in random oracle model under elliptic curve discrete logarithm assumption.Performance analysis shows the scheme is of high efficiency.

Key words: Certificate-based multi-proxy multi-signature,Random oracle model,Public key replacement attack,Bilinear pairings

[1] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceeding of Crypto’84.LNCS 196,Berlin:Springer-Verlag,1984:47-53
[2] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]∥Proceeding of ASIACRYPT 2003.LNCS 2894,Berlin:Springer-Verlag,2003:452-473
[3] Gentry C.Certificate-based encryption and the certificate revocation problem[C]∥Proc.of EuroCrypt.Berlin:Springer-Verlag,2003:272-293
[4] Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1353
[5] Hwang S J,Chen C C.A New Multi-Proxy Multi-SignatureScheme[C]∥2001 National Computer Symposium:Information Security.Taiwan,2001:19-26
[6] Kang B G,Park J H,Hahn S G.A certificate-based signaturescheme[C]∥Proc.of CT-RSA.Berlin:Springer-Verlag,2004:99-111
[7] 陈辉焱,李巍,苏艳芳.一种基于证书的代理环签名方案[J].计算机工程,2012,38(16):149-152
[8] 韩春霞,王琳杰.基于证书的多重代理多重盲签名方案研究[J].长江大学学报:自然科学版,2013,10(19):61-64
[9] 翟正元,高德智,梁向前,等.新的基于证书的代理盲签名方案[J].计算机工程与应用,2014,0(4):57-62
[10] Boldyreva A,Palacio A,Warinschi B.Secure proxy signatureschemes for delegation of signing rights[J].Journal of cryptology,2012,25(1):57-115
[11] Wang Qin,Cao Zhen-fu.Security arguments for partial delegation with warrant proxy signature schemes[EB/OL].[2004-11-17].http://erpint.iacr.org/2004/315.pdf
[12] Li Ji-guo,Huang Xin-yi,Mu Yi,et al.Certificate-based signature:security model and efficient construction[C]∥Proc.of EuroPKI’2007.2007:110-125
[13] Wu Wei,Mu Yi,Susilo W,et al.Certificate-based signatures revisited[J].Journal of universal computer science,2009,15(8):1659-1684
[14] Li Ji-guo,Xu Li-zhong,Zhang Yi-chen.Provably secure certificate-based proxy signature schemes[J].Journal of Computers,2009,4(6):444-452
[15] 陈江山.基于证书的代理签名和盲签名[D].漳州:漳州师范学院,2012
[16] Bellare M,Neven G.Multi-signatures in the plain public-keymodel and a general forking lemma[C]∥Proc of CCS’ 06.Alexandria:ACM,2006:390-399
[17] Tiwari N,Padhye S,He D.Efficient ID-based multiproxy multisignature without bilinear maps in ROM[J].Annals of telecommunications,2013,68(3-4):231-237
[18] Li Xiang-xue,Chen Ke-fei.ID-based multi-proxy signature,proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings[J].Appl Math Comput,2005(169):437-450
[19] Sahu R A,Padhye S.An ID-based multi-proxy multisignature scheme[C]∥Proceeding of IEEE international conference on computer & communication technology(ICCCT-2010).2010:60-63

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!