期刊文献+

一种有效的基于身份的隐藏签名认证方案 被引量:1

Efficient ID-based signature-masked authentication scheme
原文传递
导出
摘要 针对已有隐藏签名认证方案中,由于用户证书完全由CA签发,CA很容易获取用户向服务提供商请求的服务这一安全漏洞,提出一种新的改进方案.该方案仍然采用单CA模式,且分2个阶段执行:a.证书申请阶段,同已有方案不同的是CA为用户签发部分证书,最终证书是通过增加用户秘密值产生;b.服务请求阶段,用户通过计算证书承诺向服务提供商请求服务,该阶段即使CA(或其他攻击者)能正确地猜测出用户的最终证书,要想正确地计算出用户的证书承诺,须要求解离散对数困难问题.本方案不仅解决了已有方案的安全问题,且与同类改进方案相比,其安全性和效率都有明显的提高. As user′s certification issues by the only certificate authority(CA),the existing scheme can not prevent CA to get the user′s services from a service provider.An improved scheme was presented.In that scheme,it was still the single CA model and the two stages.Certificate application stage: different with the existing scheme,CA issued the part certificate for the users and the final certificate was generated by adding its own private information.Service request phase: a user requested service to a service provider by calculating the certificate commitment,in the stage,even though CA(or other attackers) could guess correctly the final user certificate,they needed to solve the discrete logarithm problem in order to calculate the user's certificate commitment.This new scheme solves the existing scheme security problem and its safety and efficiency have also improved significantly compared with the similar scheme.
作者 侍伟敏
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第10期61-63,68,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家重点基础研究发展计划资助项目(2007CB311100)
关键词 隐藏签名认证 基于身份的密码体制 认证机构 数字签名 双线性对 身份认证 signature-masked authentication ID-based cryptography certificate authority digital signature bilinear pairings authentication
  • 相关文献

参考文献12

  • 1Guillou L, Quisquater J. A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory [C]//Advances in Cryptology-Eurocryp( 1988. Berlin: Springer-Verlag, 1988: 123-128. 被引量:1
  • 2Shamir A. Identity-based cryptosystem and signature schemes[C]//CRYPTO 84. Berlin: Springer-Verlag, 1984: 47-53. 被引量:1
  • 3周渊,程晓明,柴震川.ID-based Key-insulated Authenticated Key Agreement Protocol[J].Journal of Shanghai Jiaotong university(Science),2007,12(2):247-249. 被引量:1
  • 4Weng Jian, Liu Shengli, Chen Kefei, et al. Identity- based key-insulated signature without random oracles [C]//CIS 2006. Berlin: Springer-Verlag, 2007: 470- 480. 被引量:1
  • 5Boneh D, Franklin M. Short signature from well pairing[C]//Boyd C ASIACRYPT 2001. Berlin: Springer-Verlag, 2001: 514-532. 被引量:1
  • 6Zhang F G, Kim K. Signature-masked authentication using the bilinear pairings[R]. [s. l]: International Research Center for Information Security (IRIS), Information and Communications University (ICU), 2002. 被引量:1
  • 7Boneh D, Franklin M. Identity based encryption from well pairing[C]//CRYPTO 2001. Berlin: Springer- Verlag, 2001: 213-229. 被引量:1
  • 8Chen L, Harrison K. Applications of multiple trust authorities in pairing based cryptosystems [C] // LNCS 2437. Berlin: Springer-Verlag, 2002: 260- 275. 被引量:1
  • 9Al-Riyami S, Paterson K. Certificateless public key cryptography [C] // Advances in Cryptology-Asiacrypt' 2003. Berlin: Springer-Verlag, 2003: 452- 472. 被引量:1
  • 10Gentry C. Certificate-based encryption and the certificate revocation problem[C] // Advances in Cryptology-Eurovrypt 2003. Berlin: Springer-Verlag, 2003: 272-293. 被引量:1

二级参考文献7

  • 1Guillou L and Quisquater J. A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory. Advances in Cryptology- Eurocrypt'1988, Springer-Verlag, 1988, LNCS 330: 123-128. 被引量:1
  • 2Zhang F G and Kim K. Signature-masked authentication using the bilinear pairings. Cryptology & Information Security Laboratory (CAIS), Information and Communications University, technical report, 2002. 被引量:1
  • 3Boneh D, Lynn B, and Shacham H. Short signatures from the Well pairing. Advance in Cryptology-Asciacrypt'2001, Springer-Verlag, 2001, LNCS 2248: 514-532. 被引量:1
  • 4Freeman D. Pairing-based identification schemes. HP Laboratories Palo AltoHPL-2005-154, 2005, August 24. 被引量:1
  • 5Chen X F, Zhang F G, and Kim K. A new ID-based group signature scheme from bilinear pairings. Cryptology ePrint Archive, Report 2003/116. 被引量:1
  • 6Chen X F, Zhang F G, and Konidala D M, et al.. New ID-based threshold signature scheme from bilinear pairings. In INDOCRYPT 2004, Springer-Verlag, 2004, LNCS 3348: 371-383. 被引量:1
  • 7Boneh D and Franklin M. Identity-based encryption from the Well pairing. Advances in Crypt ology-Crypt o'2001, Springer-Verlag, 2001, LNCS 2139: 213-229. 被引量:1

共引文献2

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部