期刊文献+

安全的无证书聚合签名方案 被引量:21

Secure Certificateless Aggregate Signature Scheme
下载PDF
导出
摘要 无证书密码系统既解决了密钥托管问题,又不涉及公钥证书;而聚合签名可以有效地减少计算代价和通信开销.结合二者的优点构造无证书聚合签名是很有意义的.尽管无证书聚合签名方案的构造已经取得了重要进展,但是现有的方案仍然不能同时达到既可抵抗两类超级攻击者又具有运算的高效性.使用双线性映射并引入状态信息来设计具有强安全性的无证书聚合签名方案.在随机预言模型中,该状态信息被用于嵌入给定困难问题的部分信息.结果显示,该方案的安全性基于计算Diffie-Hellman问题的困难性并可以抵抗超级攻击者的攻击.同时,由于充分利用公开信息和双线性映射的性质,它在个体签名和聚合签名验证过程只需4个双线性映射.另外,在该方案中,用户知道状态信息后可独立完成个体签名而无需交换信息,所以它允许用户动态地加入聚合签名.故它可应用于多对一的通信系统中. Certificateless public key cryptography can solve the key escrow problem without any digital certificates to bind users and their public keys. Meanwhile, aggregate signature can efficiently lower the cost of computations and communications. Hence it is of interest to construct a certificateless aggregate signature scheme by taking advantages of the two methods. Though great progress has been made in this area, certificateless aggregate signature schemes available today cannot simultaneously achieve the objectives of being secure against both types of super adversaries and being efficient in operation. This paper puts forward a construction of certificateless aggregate signature scheme with stronger security by using pairings and introducing state information. The state information is used to hold partial information on a given hard problem in the random oracle model. The results show that the presented scheme, based on the infeasibility of the computational Diffie-Hellman (CDH) problem, is secure against both super adversaries. At the same time, the new scheme needs only four pairings during the: processes of individual signature and verification for an aggregate signature by making good use of public information and the properties of bilinear maps. Furthermore, after knowing the same state information, a user in the scheme can perform individual signature operations in a non-interactive manner, which allows any users in the system to join dynamically for generating an aggregate signature. As a result, it can have practical applications in many-to-one communications.
出处 《软件学报》 EI CSCD 北大核心 2015年第5期1173-1180,共8页 Journal of Software
基金 国家自然科学基金(61472309 61173151 60673070 60773121) 安徽省自然科学基金(1208085MF108) 安徽省高校自然科学基金(KJ2012B157)
关键词 无证书密码系统 聚合签名 计算DIFFIE-HELLMAN问题 双线性映射 随机预言模型 certificateless cryptography aggregate signature computational Diffie-Hellman problem bilinear map random oracle model
  • 相关文献

参考文献3

二级参考文献22

  • 1Cheng Xiangguo,Liu Jingmei,Guo Lifeng,Wang Xinmei.IDENTITY-BASED MULTISIGNATURE AND AGGREGATE SIGNATURE SCHEMES FROM M-TORSION GROUPS[J].Journal of Electronics(China),2006,23(4):569-573. 被引量:11
  • 2Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the power to sign messages. IEICE Trans. on Fundamentals, 1996, E79-A(9): 1338-1353. 被引量:1
  • 3Zhang k Threshold proxy signature schemes. In: Proc. of the 1997 Information Security Workshop. Japan, 1997. 191-197. 被引量:1
  • 4Yi LJ, Bai GQ, Xiao GZ. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 2000,36(6): 527-528. 被引量:1
  • 5Huang XY, Mu Y, Susilo W, Zhang FT. Short designated verifier proxy signature from pairings. In: Proc. of the SecUbiq 2005. LNCS3823, Nagasaki, Springer-Verlag, 2005. 835-844. 被引量:1
  • 6Zhang FG, Kim-K. Efficient 1D-based-blind signature and proxy signature from bilinear pairings. In: Safavi-Naini R, Seberry J, eds. Proc. of the ACISP 2003. LNCS 2727, Springer-Verlag, 2003. 312-323. 被引量:1
  • 7Al-Riyami S, Paterson K. Certificateless public key cryptography. In: Prec. of the Asiacrypt 2003. LNCS 2894, Springer-Verlag, 2003. 452-473. 被引量:1
  • 8Huang XY, Mu Y, Susilo W, Wong DS, Wu W. Certificateless signature revisited. In: Proc. of the Acisp 2007. LNCS 4586, Springer-Verlag, 2007. 308-322. 被引量:1
  • 9Zhang ZF, Wong DS, Xu J, Feng DG. Certificateless public-key signature: Security model and efficient construction. In: Zhou J, Yung M, Bao F, eds. Proc. of the ACNS 2006. LNCS 3989, Springer-Verlag, 2006. 293-308. 被引量:1
  • 10Li X, Chen K, Sun L. Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal, 2005,45(1 ):76-83. 被引量:1

共引文献45

同被引文献126

  • 1杨涛,孔令波,胡建斌,陈钟.聚合签名及其应用研究综述[J].计算机研究与发展,2012,49(S2):192-199. 被引量:10
  • 2程相国,刘景美,王新梅.m-挠群上一种基于身份的聚合签名方案[J].西安电子科技大学学报,2005,32(3):427-431. 被引量:3
  • 3Cheng Xiangguo,Liu Jingmei,Guo Lifeng,Wang Xinmei.IDENTITY-BASED MULTISIGNATURE AND AGGREGATE SIGNATURE SCHEMES FROM M-TORSION GROUPS[J].Journal of Electronics(China),2006,23(4):569-573. 被引量:11
  • 4Gutmann P. PKI: It's not dead, just resting [J]. IEEE Computer, 2002, 35(8): 41-49. 被引量:1
  • 5Shamir A. Identity-based cryptosystems and signature schemes [C]//Advanes in Cryptology: CRYPTO1984, LNCS 196. Berlin: Springer-Verlag, 1984:47-53. 被引量:1
  • 6Sattarn S, AI-Riyami, Kenneth G, et al. Certificateless public key cryptography [C]//Advanes in Cryptology: ASI- ACRYPT 2003, LNCS: 2894.Berlin: Springer-Verlag, 2003:452-473. 被引量:1
  • 7Gentry C. Certificate-based encryption and the certificate revocation problem [C]//Advanes in Cryptology: EUROCRYPT 2003, LNCS: 2656. Berlin: Springer-Verlag,2003: 272-293. 被引量:1
  • 8Boneh D, Gentry C, Lynn B, et al. Aggregate and verifiably encrypted signatures from bilinear maps [C]//Advances in Cryptology:EUROCRYPT 2003, LNCS: 2656. Berlin: Springer, 2003:416-432. 被引量:1
  • 9Huang X, Mu Y, Susilo W, et al. Certificateless signature: new schemes and security models [J]. The Computer Jour- nal, 2012, 55(4): 457-474. 被引量:1
  • 10Wu C, Lin W, Huang H, et al. Cryptanalysis of some certificateless signature schemes in the standard model [J]. Int. J. Appl. Math. Stat., 2013, 36(6): 16-25. 被引量:1

引证文献21

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部