期刊文献+

有效的无证书签名方案 被引量:7

Efficient certificateless signature scheme
下载PDF
导出
摘要 为解决基于身份的密码体制的密钥托管问题以及传统公钥密码体制的公钥认证问题,通过修改Barreto等人提出的高效的基于身份的签名方案中的私钥和公钥的产生算法,提出了一个无证书签名方案。该方案在随机预言模型下是可证明安全的,而且也是高效的方案,只需要一个对运算。 To solve the key escrow problem of ID-based cryptography and the public key authentication of traditional public key cryptosystem,a certificateless signature scheme revising the private and public generation algorithms in Barreto et al.'s efficient ID-based signature was proposed.The scheme is provably secure in the random oracle model,and is an efficient scheme.It only needs one pairing operation.
作者 洪东招 谢琪
出处 《计算机应用》 CSCD 北大核心 2010年第7期1809-1811,共3页 journal of Computer Applications
关键词 无证书签名 双线性对 q-SDH问题 Inv-CDH问题 随机预言机 certificateless signature bilinear pairings q-Strong Diffie-Hellman Problem q-SDHP(q-SDHP) Inverse Computational Diffie-Hellman Problem(Inv-CDHP) random oracle
  • 相关文献

参考文献16

  • 1SHAMIR A.Identity-based cryptosystems and signature schemes[C] // Advances in Cryptology-CRYPTO'84,LNCS 196.Berlin:Springer-Verlag,1985:47-53. 被引量:1
  • 2AL-RIYAMI S S,PATERSON K G.Certificateless public key cryptography[C] // Advances in Cryptology-ASIACRYPTO'03,LNCS 2894.Berlin:Springer-Verlag,2003:452-473. 被引量:1
  • 3YUM D H,LEE P J.Generic construction of certificateless signature[C] // ACISP 2004:Australasian Conference on Information Security and Privacy,LNCS 3108.Berlin:Springer-Verlag,2004:200-211. 被引量:1
  • 4LI X,CHEN K,SUN L.Certificateless signature and proxy signature schemes from bilinear pairings[J].Lithuanian Mathematical Journal,2005,45(1):76-83. 被引量:1
  • 5YAP W S,HENG S H,GOI B M.An efficient certificateless signature scheme[C] // EUCWorkshops 2006:Emerging Directions in Embedded and Ubiquitous Computing,LNCS 4097.Berlin:Springer-Verlag,2006:322-331. 被引量:1
  • 6HUANG X Y,SUSILO W,MU Y,et al.On the security of certificateless signature schemes from Asiacrypt 2003[C] // CANS 2005:Cryptology and Network Security,LNCS 3810.Berlin:Springer-Verlag,2005:13-25. 被引量:1
  • 7HU B C,WONG D S,ZHANG Z F,et al.Key replacement attack against a generic construction of certificateless signature[C] // ACISP2006:Australasian Conference on Information Security and Privacy,LNCS 4058.Berlin:Springer-Verlag,2006:235-246. 被引量:1
  • 8AU M H,CHEN J,LIU J K,et al.Malicious KGC attacks in certificateless cryptography[C] // ASIACCS 2007:The 2nd ACM Symposium on Information,Computer and Communications Security.New York:ACM,2007:302-311. 被引量:1
  • 9PARK J H.An attack on the certificateless signature scheme from EUC Workshops 2006:Cryptology ePrint Archive,Report 2006/442[EB/OL].[2009-10-31].http://eprint.iacr.org/2006/442.pdf. 被引量:1
  • 10DU H Z,WEN Q Y.Efficient and provably-secure certificateless short signature scheme from bilinear pairings[J].Computer Standards and Interfaces,2009,31(2):390-394. 被引量:1

二级参考文献15

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of CRYPTO 84 on Advances in Cryptology, LNCS 196. Berlin: Springer-Verlag, 1985:47 -53. 被引量:1
  • 2AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography [ C]// Cryptology-Asiacrypt 2003, LNCS 2894. Berlin: Springer-Verlag, 2003:452-473. 被引量:1
  • 3HUANG XIN-YI, SUSILO W, MU YI, et al. On the security of certifieateless signature schemes from Asiacrypt 2003 [ C]//Cryptology and Network Security: CANS 2005, LNCS 3810. Berlin: Springer- Verlag, 2005:13-25. 被引量:1
  • 4YUM D H, LEE P J. Generic construction of certificateless signature [ C]//Australasian Conference on Information Security and Privacy: ACISP 2004, LNCS 3108. Berlin: Springer-Verlag, 2004: 200 -211. 被引量:1
  • 5HUB C, WONG D S, ZHANG ZHEN-FENG, et al. Key replacement attack against a generic construction of certificateless signature [ C]// Australasian Conference on Information Security And Privacy: ACISP2006, LNCS4058. Berlin: Springer-Verlag, 2006:235 - 246. 被引量:1
  • 6ZHANG ZHEN-FENG, WONG D S, XU JING, et al. Certificateless public-key signature: Security model and efficient construction [ C]// Fourth International Conference on Applied Cryptography and Network Security: ACNS 2006, LNCS 3989. Berlin: Springer-Verlag, 2006:293-308. 被引量:1
  • 7GORANTLA M C, SAXENA A. An efficient certfficateless signature scheme [ C]//Proceedings of Computational Intelligence and Security: CIS 2005, LNAI 3802. Berlin: Springer-Verlag, 2005: 110- 116. 被引量:1
  • 8YAP W-S, HENG S-H, GOI B-M. An efficient certificateless signature scheme [ C]// Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006, LNCS 4097. Berlin: Springer-Verlag, 2006:322-331. 被引量:1
  • 9GOYA G H. Proposta de esquemas de criptografia e de assinatura sob modelo de criptografia de cha publica sem certificado [ EB/OL]. [ 2008 -09 -22 ]. http://www, ime. usp. br/- dhgoya./dis_denise. pdf. 被引量:1
  • 10CAO XUE-FEI, PATERSON K G, KOU WEI-DONG. An attack on a certificateless signature scheme: Cryptology ePrint Archive, Report 2006/367 [ R/OL]. (2006 - 10 -25) [2008 -09 - 12]. http://eprint, iacr. org/2006/367. 被引量:1

共引文献13

同被引文献65

  • 1A1-RIYAMI S S,PATERSON K G.Certificateless public key cryptog-raphy[C]//Advances in ASIACRYPT 2003,vol 2894.Berlin:Springer-Verlag,2003:452-473. 被引量:1
  • 2BARBOSA M,FARSHIM P.Certificateless signcryption[C]//Procof ACM Symposium on Information,Computer and CommunicationsSecurity.New York:ACM Press,2008:369-372. 被引量:1
  • 3TSO R,YI Xun,HUANG Xin-yi.Efficient and short certificatelesssignature[C]//Proc of the 7th International Conference on Cryptolo-gy and Network Security.Berlin:Springer-Verlag,2008:64-79. 被引量:1
  • 4HUANG Xin-yi,MU Yi,SUSILO W,et al.Certificateless signaturerevisited[C]//Proc of the 12th Australasian Conference on Informa-tion Security and Privacy.Berlin:Springer-Verlag,2007:308-322. 被引量:1
  • 5BACK J,SAFAVI-NAINI R,SUSILO W.Certificateless public keyencryption without pairing[C]//Proc of the 8th Information SecurityConference.Berlin:Springer-Verlag,2005:134-148. 被引量:1
  • 6SUN Yin-xia,ZHANG Fu-tai,BACK J.Strongly secure certificate-less public key encryption without pairing[C]//Proc of the 6th Inter-national Conference on Cryptology and Network Security.Berlin:Springer-Verlag,2007:194-208. 被引量:1
  • 7AL-RIYAMI S, PATERSON K. Certificateless public key cryptogra- phy [ C ]//LNCS, vol 2894. Berlin: Springer-Verlag, 2003 : 452- 473. 被引量:1
  • 8HUANG X, SUSILO W, MU Y, et al. On the security of certificateless signature schemes from Asiacrypt [ C]//LNCS, vol 3810. Berlin: Springer-Vedag ,2005 : 13- 25. 被引量:1
  • 9ZHANG Z F, WONG D S, XU J, et al. Certificateless public-key signa- ture : security model and efficient construction [ C ]//LNCS, vol 3989. Berlin : Springer-Verlag,2006 : 293- 308. 被引量:1
  • 10AU M H, CHEN J, LIU J K,et al. Malicious KGC attacks in certifi- cateless cryptography [ C ]//Proc of ASIACCS. New York : ACM Press, 2007:302-311. 被引量:1

引证文献7

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部