期刊文献+

一个新的基于身份的代理聚合签名方案 被引量:2

A New ID-based Proxy Aggregate Signature Scheme
下载PDF
导出
摘要 代理聚合签名方案可以将同一原始签名者授权的n个代理签名者对n个不同消息的签名聚合成一个签名.构造了一个新的基于身份的代理聚合签名方案,使之同时具备代理签名和聚合签名的优势,在随机预言机模型下,新方案是可证安全的且效率更高. A proxy aggregate signature scheme allows n proxy signers to sign n different messages on behalf of a same original signer, and then the n different signatures can be aggregated into a single signature. Construct a new ID-based proxy aggregate signature scheme, which obtains the advantage of proxy signature and aggregate signature meanwhile, and the new scheme is more efficient and is provable security in the random oracle model.
出处 《闽南师范大学学报(自然科学版)》 2015年第4期34-40,共7页 Journal of Minnan Normal University:Natural Science
基金 国家自然科学基金项目(61170246 61373140) 福建省中青年教师教育科研项目A类(JA14202 JA15317)
关键词 基于身份签名 聚合签名 代理签名 计算性Diffie-Hellman问题 identity-based signature aggregate signature proxy signature computational Diffie-hellman problem
  • 相关文献

参考文献8

  • 1Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages[J]. IEICE Trans. Fundamentals, 1996, E79-A(9): 1338-1353. 被引量:1
  • 2Mambo M, Usuda K, Okamoto E. Proxy signature for delegating signing operation[C]//Proeeedings of the 3rd ACM Conf- erence on Computer and Communications Security. New York: ACM, 1996: 48-57. 被引量:1
  • 3Boneh d, Gentry C, Lynn B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[C]//Eurocrypt 03, LNCS 3027. Berlin: Springer-Verlag, 2003: 416-432. 被引量:1
  • 4Li J, Kim K, Zhang F, et al. Aggregate proxy signature and verifiably encrypted proxy signature[C]//ProvSec 2007, LNCS 4784. Berlin: Springer-Verlag, 2007: 208-217. 被引量:1
  • 5王勇兵,卢晓杰,张建中.一种基于身份的代理聚合签名方案[J].济南大学学报(自然科学版),2011,25(3):301-304. 被引量:7
  • 6孙华,郭磊,郑雪峰,韩晓光.一种有效可证安全的基于身份代理聚合签名方案[J].计算机科学,2012,39(1):44-47. 被引量:8
  • 7陈群山,黄振杰,郝艳华,黄茹芬.基于身份的代理聚合签名方案的分析与改进[J].济南大学学报(自然科学版),2014,28(3):204-208. 被引量:4
  • 8Bellare M, Nampempre C, Neven G. Security proofs for identity-based identification and signature schemes[C]//Euroerypt'04, LNCS 3027. Berlin: Springer-Verlag, 2004: 268-286. 被引量:1

二级参考文献37

  • 1MAMBO M, USUDA K, OKAMATO E. Proxy signatures for delega- ting signing operation[ C]///Proceedings of the 3 rd ACM Confer- ence on Computer and Communications Security. New York : ACM, 1996:48 - 57. 被引量:1
  • 2HWANG S J, CHEN C C. New multi-proxy-multi-signature schemes [ J ]. Applied Mathematics and Computation,2004,147:57 - 67. 被引量:1
  • 3SUN H. Design of time-stamped proxy signature with traceable re- ceivers [J]. IEE Proc Comput Digit,2000,147 (6) :462 - 466. 被引量:1
  • 4HUANG H, CHANG C. A novel efficient (t, n) threshold proxy signature scheme[J]. Information Science,2006,176 (10) : 1338 - 1349. 被引量:1
  • 5HWANG M, LU J, LIN I. A practical ( t, n) threshold proxy signa- ture scheme based on RSA cryptosystem [ J ]. IEEE Trans on Knowledge and Data Engineering, 2003,15 ( 6 ) : 1552 - 1560. 被引量:1
  • 6BAO Haiyong, CAO Zhenfu, WANG Shengbao. Identity based thresh- old proxy signature scheme with knows signers[C] //The 3rd Annual Conference in Theory and Applications of Models of Computation- TAM' 06. Berlin : Springer-Verlag,2006:538 - 546. 被引量:1
  • 7ZHANG Fangguo. Efficient ID-based blind signature and proxy sig- nature from bilinear parings [ C ] // Proc of ACISP' 03. Berlin : Springer-Verlag,2003 : 312 - 323. 被引量:1
  • 8LI Mingxiang,HAN Botao,ZHU Jianyong,et al. Identity-based proxy signature scheme secure in standard model [ J ]. Journal of South China University of Technology (Natural Science Edition ), 2009 (5) :118 - 122,129. 被引量:1
  • 9BONEH D, GENTRY C. Aggregate and verifiably encrypted signa- tures from bilinear maps [ C ]//Advances in Cryptography-Euro- crypt 2003. Berlin : Springer-Verlag,2003:416 - 432. 被引量:1
  • 10CHA J C, CHEON J H. An identity-based signature from gap Dif- fie-Hellman groups [ C ] //Public Key Cryptography-PKC 2003. Berlin : Springer-Verlag, 2003 : 18 - 30. 被引量:1

共引文献10

同被引文献13

  • 1BONEH D, GENTRY C, LYNN B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[ C]// Proceedings of EU- ROCRYPT 2003 on Advances in Cryptology. Berlin: Springer, 2003:416-432. 被引量:1
  • 2MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delega- ting signing operation[ C] // Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York: ACM, 1995:48 - 57. 被引量:1
  • 3BOLDYREVA A, PALACIO A, WARINSCHI B. Secure proxy sig- nature schemes for delegation of signing rights[ J]. Journal of Cryp- tology, 2012, 25(1): 57-115. 被引量:1
  • 4GENTRY C. Certificate-based encryption and the certificate revoca- tion problem[ C] // Proceedings of EUROCRYPT 2003: Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2003:272-293. 被引量:1
  • 5LI J, KIM K, ZHANG F, et al. Aggregate proxy signature and veri- fiably encrypted proxy signature[ C]/! Proceedings of the First Inter- national Conference on Provable Security, LNCS 4784. Berlin: Springer, 2007:208-217. 被引量:1
  • 6ZHANG J. On the security of a certificate-based signature scheme and its improvement with pairings[ C]// ISPEC 2009: Proceedings of the 5th Intemationa| Conference on Information Security Practice and Experience, LNCS 5451. Berlin: Springer, 2009:47-58. 被引量:1
  • 7KYUNG A H S. An ID-based aggregate signature scheme with con- stant pairing computations[ J]. Journal of Systems and Software, 2010, 83(10): 1873-1880. 被引量:1
  • 8LIN Y, WU Z, CAI J. ID-based aggregate proxy signature scheme realizing warrant-based delegation[ J]. Journal of Information Sci- ence and Engineering, 2013, 29(3): 441-457. 被引量:1
  • 9王勇兵,卢晓杰,张建中.一种基于身份的代理聚合签名方案[J].济南大学学报(自然科学版),2011,25(3):301-304. 被引量:7
  • 10陈建能,岳昊,黄振杰.一个可证安全的基于证书聚合签名方案[J].计算机工程与应用,2013,49(21):60-64. 被引量:12

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部