计算机应用 ›› 2014, Vol. 34 ›› Issue (9): 2664-2667.DOI: 10.11772/j.issn.1001-9081.2014.09.2664
收稿日期:
2014-04-08
修回日期:
2014-06-20
出版日期:
2014-09-01
发布日期:
2014-09-30
通讯作者:
刘云芳
作者简介:
基金资助:
天水师范学院科研项目
LIU Yunfang,ZUO Weiping
Received:
2014-04-08
Revised:
2014-06-20
Online:
2014-09-01
Published:
2014-09-30
Contact:
LIU Yunfang
摘要:
聚合签名主要适用于需要将不同用户对不同消息的签名聚合成一个单一签名的场合。针对已有的基于证书聚合签名方案效率不高的问题,利用双线对构造了一个高效的基于证书聚合签名方案。在随机预言模型中证明了方案在适应性选择消息和身份攻击下是存在性不可伪造的,其安全性归约为计算Diffie-Hellman(CDH)困难问题。分析表明该方案的对运算是常量,而且只需3次双线性对运算,因此运算效率较高。
中图分类号:
刘云芳 左为平. 高效的可证明安全的基于证书聚合签名方案[J]. 计算机应用, 2014, 34(9): 2664-2667.
LIU Yunfang ZUO Weiping. Efficient and provably-secure certificate-based aggregate signature scheme[J]. Journal of Computer Applications, 2014, 34(9): 2664-2667.
[1]GENTRY C. Certificate-based encryption and the certificate revocation problem [C]// EUROCRYPT'03: Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 2656. Berlin: Springer-Verlag, 2003: 272-293.
[2]GIRAULT M. Self-certified public keys [C]// EUROCRYPT '91: Proceedings of the 1991 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 547. Berlin: Springer-Verlag, 1991:491-497.
[3]KANG B G, PARK J H, HAHN S G. A certificate-based signature scheme [C]// CT-RSA'04: Proceedings of the 2004 Conference on Topics in Cryptology. Berlin: Springer-Verlag, 2004: 99-111.
〖BP(〗http://www.docin.com/p-675956981.html【〖BP)〗
[4]LI J G, HUANG X Y, MU Y, et al.Certificate-based signature: security model and efficient construction [C]// EuroPKI'07: Proceedings of the 4th European PKI Workshop: Theory and Practice, LNCS 4582. Berlin: Springer-Verlag, 2007: 110-125.
[5]LIU J K, BAO F, ZHOU J. Short and efficient certificate-based signature [EB/OL]. [2013-12-20]. http://eprint.iacr.org/2006/394.pdf.
〖BP(〗International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, LNCS 6827【PDF?〖BP)〗
[6]〖CM(27〗YANG B, XIAO Z. Efficient certificate-based signature scheme [J]. Journal of Beijing University of Posts and Telecommunications, 2012, 35(5):73-76. (杨波,肖自碧.基于证书的签名方案[J].北京邮电大学学报,2012,35(5):73-76.)
[7]HUANG Z, GUO Y. An efficient certificate-based signature scheme with bilinear pairing [J]. Journal of Jiangsu University: Natural Science Edition, 2013, 34(3): 320-325. (黄振杰,郭亚峰.一个双线性对下高效的基于证书签名方案[J].江苏大学学报:自然科学版, 2013, 34(3): 320-325.)
[8]ZHOU P, HE D. Efficient certificate-based signature scheme without pairings [J]. Application Research of Computers, 2013, 30(5): 1504-1507. (周萍,何大可. 高效不含双线性对的基于证书签名方案[J].计算机应用研究,2013,30(5):1504-1507.)
[9]LI J, QIAN N, HUANG X, et al.Certificate-based strong designated verifier signature scheme [J]. Chinese Journal of Computers, 2012,35 (8): 1579-1587. (李继国,钱娜,黄欣沂,等.基于证书强指定验证者签名方案[J].计算机学报,2012, 35 (8): 1579-1587.)
[10]LIU K, BAEK J, SUSILO W. Certificate-based signature schemes without pairings or random oracles [EB/OL]. [2013-12-25]. http://eprint.iacr.org/2008/275.pdf.
〖BP(〗LNCS 5222, 11th International Conference, ISC 2008【〖BP)〗
[11]BONEH D, GENTRY C, LYNN B, et al.Aggregate and verifiably encrypted signatures from bilinear maps [C]// EUROCRYPT'03: Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 2656. Berlin: Springer-Verlag, 2003: 416-432.
[12]LIU J K, BAEK J, ZHOU J. Certificate-based sequential aggregate signature [C]// WiSec'09: Proceedings of the 2th ACM Conference on Wireless Network Security. New York: ACM, 2009: 21-28.
[13]PENG Y, PENG C, FENG L. Certificate-based aggregate signature scheme [J]. Computer Science, 2011, 38(12): 57-60. (彭延国,彭长根,冯蕾.一个基于证书的聚集签名方案[J].计算机科学,2011,38(12):57 -60.)
[14]CHEN J, YUE H, HUANG Z. Secure certificate-based aggregate signature scheme [J]. Computer Engineering and Applications, 2013, 49(21): 60-64. (陈建能,岳昊,黄振杰. 一个可证安全的基于证书聚合签名方案[J].计算机工程与应用,2013,49(21):60-64.) |
[1] | 孙晓玲 李姗姗 杨光 杨秋格. 基于差分表的Blow-CAST-Fish的密钥恢复攻击[J]. 计算机应用, 0, (): 0-0. |
[2] | 樊缤 李智 高健. 基于多尺度知识学习的深度鲁棒水印算法[J]. 计算机应用, 0, (): 0-0. |
[3] | 郭丽峰 王倩丽. 自适应安全的带关键字搜索的外包属性基加密[J]. 计算机应用, 0, (): 0-0. |
[4] | 沈子懿, 王卫亚, 蒋东华, 荣宪伟. 基于Hopfield混沌神经网络和压缩感知的可视化图像加密算法[J]. 计算机应用, 2021, 41(10): 2893-2899. |
[5] | 巫光福, 王影军. 基于区块链与云-边缘计算混合架构的车联网数据安全存储与共享方案[J]. 计算机应用, 2021, 41(10): 2885-2892. |
[6] | 高健 李智 樊缤 姜传贤. 基于光线投射采样和四元数正交矩的高效三维医学图像鲁棒零水印算法 [J]. 计算机应用, 0, (): 0-0. |
[7] | 徐丽云, 闫涛, 钱宇华. 基于级联混沌系统的分数域语音加密算法[J]. 计算机应用, 2021, 41(9): 2623-2630. |
[8] | 陈恒恒, 倪志伟, 朱旭辉, 金媛媛, 陈千. 基于聚类分析的差分隐私高维数据发布方法[J]. 计算机应用, 2021, 41(9): 2578-2585. |
[9] | 张永斌, 常文欣, 孙连山, 张航. 基于字典的域名生成算法生成域名的检测方法[J]. 计算机应用, 2021, 41(9): 2609-2614. |
[10] | 葛纪红, 沈韬. 基于区块链的能源数据访问控制方法[J]. 计算机应用, 2021, 41(9): 2615-2622. |
[11] | 张师鹏, 李永忠, 杜祥通. 基于半监督学习和三支决策的入侵检测模型[J]. 计算机应用, 2021, 41(9): 2602-2608. |
[12] | 李莉 杨鸿飞 董秀则. 基于身份多条件代理重加密的文件分级访问控制方案[J]. 计算机应用, 0, (): 0-0. |
[13] | 郭媛 王学文 王充 姜津霖. 基于动态网络的非线性置乱扩散同步图像加密[J]. 计算机应用, 0, (): 0-0. |
[14] | 陈葳葳, 曹利, 顾翔. 基于区块链的车联网电子取证模型[J]. 计算机应用, 2021, 41(7): 1989-1995. |
[15] | 卿欣艺, 陈玉玲, 周正强, 涂园超, 李涛. 基于中国剩余定理的区块链存储扩展模型[J]. 计算机应用, 2021, 41(7): 1977-1982. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||