期刊文献+

一种分层的身份签名方案 被引量:1

A Hierarchical Identity-based Signature Scheme
下载PDF
导出
摘要 根据Waters提出的基于身份的加密方案,设计一个分层的基于身份的签名方案,并利用计算Diffie-Hellman问题的困难性在标准模型下证明了方案的安全性.目前,对于分层的基于身份的签名方案来说,有些方案的安全性证明是在随机预言模型下进行的,有些方案的安全性证明是基于强的困难假设进行的.因此,与这些方案相比,本文方案的安全性比较高. This paper presents a hierarchical identity based signature scheme from a modification of Waters' proposed identity based encryption scheme. The scheme' s security is proven in the standard model and rests on the hardness of the computational Diffie-Hellman problem in groups equipped with a pairing. At present, the security of the hierarchical identity based signature schemes is proven either in the random oracle model or based on the strong complexity assumption. Therefore, the scheme that this paper puts forward is more secure than the existing schemes.
出处 《小型微型计算机系统》 CSCD 北大核心 2008年第8期1411-1414,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金资助项目(90412012)资助
关键词 双线性对 计算DIFFIE-HELLMAN问题 分层的基于身份的签名 bilinear pairings computational diffie-hellman problem hierarchical identity based signature
  • 相关文献

参考文献12

  • 1Adi Shamlr. Identity-based cryptosystems and signature schemes[A]. In G. Blakley and David Chaum, editors, Proceedings of Crypto 1984, volume 196 of LNCS[C] . Springer- Verlag,1984, 47-53. 被引量:1
  • 2Dan Boneh, Matt Franklin. Identity-based encryption from the Well pairing [C]. Joe Kilian, editor, Proceedings of Crypto 2001, LNCS Sprlnger-Verlag, 2001, 2139: 213-229. 被引量:1
  • 3Brent Waters. Efficient identity-based encryption without random oracles[C]. Advances in Cryptology-EUROCRYPT 2005, Springer-Verlag, 2005,LNCS, 3494:114-127. 被引量:1
  • 4Craig Gentry. Practical identity-based encryption without random oracles [C]. Advances in Cryptology-EUROCRYPT 2006, Sprlnger-Verlag, 2006, LNCS, 4404:445-464. 被引量:1
  • 5Florian Hess. Efficient identity based signature schemes based on pairings[C]. Kaisa Nyberg and Howard M. Heys, editors, Selected Areas in Cryptography, Springer-Verlag, 2002, LNCS, 2595,310-324. 被引量:1
  • 6Kenneth G Paterson, Jacob C N Schuldt. Efficient identity-based signatures secure in the standard model[C]. ACISP' 06, Springer-Verlag, 2006, LNCS, 4058:207-222. 被引量:1
  • 7Craig Gentry,Alice Silverberg. Hierarchical ID-based cryptography [C]. Yuliang Zheng, editor, Proceedings of Asiacrypt 2002, Springer-Verlag, 2002, LNCS, 2501 : 548-566. 被引量:1
  • 8Dan Boneh, Xavier Boyen. Efficient selective-ID secure identity based encryption without random oracles [C]. Advances in Cryptology-EUROCRYPT 2004, Springer-Verlag, 2004, LNCS, 3027 : 223-238. 被引量:1
  • 9Dan Boneh, Xavier Boyen, Eu-Jin Goh. Hierarchical identity-based encryption with constant size ciphertext[C]. Advances in Cryptology-EUROCRYPT 2005 Springer-Verlag, 2005, LNCS, 3494: 440-456. 被引量:1
  • 10Sherman S M Chow, Lucas C K Hui, Siu MingYiu, et al. Secure hierarchical identity based signature and its application[C]. ICICS 2004, Springer-Verlag, 2004,LNCS, 3269:480-494. 被引量:1

二级参考文献9

  • 1SHAMIR A.Identity-based cryptosystems and signature schemes[A].BLAKLEY G R,CHAUM David.1984 Advances in Cryptology-CRYPTO Proceedings[C].USA:Springer,1984,LNCS 196:47-53. 被引量:1
  • 2BONEH D,FRANKLIN M.Identity-based encryption from the weil pairing[A].KILIAN Joe.2001 Advances in Cryptology-CRYPTO Proceedings[C].USA:Springer,2001.LNCS 2139.213-229. 被引量:1
  • 3BONEH D,BOYEN X.Efficient selective-ID secure identity-based encryption without random oracles[A].CACHIN Christian,CAMENISCH Jan.2004 Advances in Cryptology-EUROCRYPT Proceedings[C].Switzerland:Springer,2004.LNCS 3027.223-238. 被引量:1
  • 4BONEH D,BOYEN X.Secure identity based encryption without random oracles[A].FRANKLIN Matthew K.2004 Advances in Cryptology-CRYPTO Proceedings[C].USA:Springer,2004.LNCS 3152.443-459. 被引量:1
  • 5BONEH D,KATZ J.Improved efficiency for CCA-secure cryptosystems built using identity-based encryption[A].MENEZES Alfred.2005 Topics in Cryptology-CT-RSA Proceedings[C].USA:Springer,2005.LNCS 3376.87-103. 被引量:1
  • 6GENTRY C,SILVERBERG A.Hierarchical ID-based cryptography[A].ZHENG Yuliang.2002 Advances in Cryptology -ASIACRYPT[C].New Zealand:Springer,2002.LNCS 2501.548-566. 被引量:1
  • 7BONEH D,BOYEN X,GOH E J.Hierarchical identity based encryption with constant size ciphertext[A].CRAMER Ronald.2005 Advances in Cryptology-EUROCRYPT Proceedings[C].Denmark:Springer,2005.LNCS 3494.440-456. 被引量:1
  • 8LI J,ZHANG F,WANG Y.A New hierarchical ID-based cryptosystem and CCA-secure PKE[A].ZHOU Xiao-bo,et al.2006 EUC Proceedings[C].KOREA:Springer,2006.LNCS 4097.362-371. 被引量:1
  • 9CHOW S M,HUI C K,YIU S M,CHOW K P.Secure Hierarchical Identity Based Signature and Its Application[A].Lopez Javier,et al.2004 ICICS Proceedings[C].Spain:Springer,2004.LNCS 3269.480-494. 被引量:1

共引文献12

同被引文献3

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部