计算机应用 ›› 2016, Vol. 36 ›› Issue (10): 2758-2761.DOI: 10.11772/j.issn.1001-9081.2016.10.2758

• 网络空间安全 • 上一篇    下一篇

改进的基于证书的聚合代理签名方案

左黎明1,2, 郭红丽1,2, 张婷婷1,2, 陈祚松1,2   

  1. 1. 华东交通大学 理学院, 南昌 330013;
    2. 华东交通大学 系统工程与密码学研究所, 南昌 330013
  • 收稿日期:2016-03-14 修回日期:2016-06-17 出版日期:2016-10-10 发布日期:2016-10-10
  • 通讯作者: 左黎明,E-mail:limingzuo@126.com
  • 作者简介:左黎明(1981—),男,江西鹰潭人,副教授,硕士,CCF会员,主要研究方向:信息安全、非线性系统;郭红丽(1988—),女,河南登封人,硕士研究生,主要研究方向:信息安全;张婷婷(1991—),女,河南濮阳人,硕士研究生,主要研究方向:信息安全;陈祚松(1993—),男,江西赣州人,硕士研究生,主要研究方向:信息安全。
  • 基金资助:
    国家自然科学基金资助项目(11361024,11261019);江西省自然科学基金资助项目(20151BAB201002)。

Improved certificate-based aggregate proxy signature scheme

ZUO Liming1,2, GUO Hongli1,2, ZHANG Tingting1,2, CHEN Zuosong1,2   

  1. 1. School of Basic Science, East China Jiaotong University, Nanchang Jiangxi 330013, China;
    2. Systems Engineering and Cryptography Institute, East China Jiaotong University, Nanchang Jiangxi 330013, China
  • Received:2016-03-14 Revised:2016-06-17 Online:2016-10-10 Published:2016-10-10
  • Supported by:
    BackgroundThis work is partially supported by the National Natural Science Foundation of China (11361024,11261019), the National Natural Science Foundation of Jiangxi Province (20151BAB201002).

摘要: 针对喻琇瑛等(喻琇瑛,何大可.基于双线性对的聚合代理签名.中南大学学报(自然科学版),2015,46(12):4535-4541.)提出的聚合代理签名方案进行分析,指出该方案存在已知一个有效签名的情况下可伪造任意消息的有效签名漏洞,在此基础上提出了一个改进的基于证书的聚合代理签名方案,给出了一种新的攻击模型,并在随机预言机模型下证明了新方案针对新的攻击者是存在性不可伪造的。改进后的新方案能够抵抗合谋攻击和伪造签名攻击,适用于计算受限以及实时要求高的应用场合。

关键词: 基于证书, 聚合代理签名, 随机预言机, 计算Diffie-Hellman难题, 存在性不可伪造

Abstract: The analysis of aggregate proxy signature scheme proposed by Yu et al. (YU X Y, HE D K. A certificate-based aggregate proxy signature scheme. Journal of Central South University (Science and Technology), 2015, 46(12): 4535-4541.) showed that a valid signatures could be forged for any messages while knowing a valid signature. Therefore, an improved certificate-based aggregate proxy signature scheme was proposed and a new attack model was given. The new scheme was proved to be existentially unforgeable for the new attacker in random oracle model. The results show that the proposed scheme can resist conspiracy attacks and forgery attacks, and it is more suitable for the computation-constrained and real-time tasks.

Key words: certificate-based, aggregate proxy signature, random oracle model, Computational Diffie-Hellman (CDH) problem, existentially unforgeable

中图分类号: