计算机应用 ›› 2018, Vol. 38 ›› Issue (12): 3455-3461.DOI: 10.11772/j.issn.1001-9081.2018051159

• 网络空间安全 • 上一篇    下一篇

高效的可证安全短代理签名方案

左黎明1,2, 陈祚松1,2, 夏萍萍1,2, 易传佳1,2   

  1. 1. 华东交通大学 理学院, 南昌 330013;
    2. 华东交通大学 系统工程与密码学研究所, 南昌 330013
  • 收稿日期:2018-06-08 修回日期:2018-07-10 出版日期:2018-12-10 发布日期:2018-12-15
  • 通讯作者: 左黎明
  • 作者简介:左黎明(1981-),男,江西鹰潭人,副教授,硕士,CCF会员,主要研究方向:信息安全;陈祚松(1993-),男,江西赣州人,硕士研究生,主要研究方向:信息安全;夏萍萍(1995-),女,江西吉安人,硕士研究生,主要要研究方向:信息安全;易传佳(1995-),男,江西宜春人,硕士研究生,主要研究生方向:信息安全。
  • 基金资助:
    国家自然科学基金资助项目(11761033);江西省教育厅科技项目(GJJ170386,GJJ161417);江西省研究生创新专项资金项目(YC2017-S257)。

Efficient and provably secure short proxy signature scheme

ZUO Liming1,2, CHEN Zuosong1,2, XIA Pingping1,2, YI Chuanjia1,2   

  1. 1. School of Science, East China Jiaotong University, Nanchang Jiangxi 330013, China;
    2. Institute of Systems Engineering and Cryptography, East China Jiaotong University, Nanchang Jiangxi 330013, China
  • Received:2018-06-08 Revised:2018-07-10 Online:2018-12-10 Published:2018-12-15
  • Contact: 左黎明
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (11761033), the Science and Technology Project of Jiangxi Provincial Department Education (GJJ170386, GJJ161417), the Innovation Fund Designated for Graduate Students of Jiangxi Province (YC2017-S257).

摘要: 代理签名在大规模无线工控物联网中应用广泛,利用代理签名可以大大提高签名主服务器的效率。为适应带宽受限和计算能力弱的应用环境,提出了一个基于双线性映射的短代理签名方案。首先,在随机预言机模型下基于计算Diffie-Hellman(CDH)问题和k-碰撞攻击算法(k-CAA)问题证明了该方案的安全性。然后,与其他现有代理签名和短代理签名方案进行了性能上的优势分析,并给出了该方案实现的关键代码。实验结果表明,所提方案在代理签名生成时进行了1次标量乘运算和1次哈希运算,签名验证时进行了2次双线性对运算、1次标量乘运算和2次哈希运算,与其他同类代理签名方案相比计算性能上具有优势,适用于计算能力较弱和传输能力受限的应用场景。

关键词: 短代理签名, 随机预言机模型, 双线性对, 计算Diffie-Hellman问题, k-碰撞攻击算法问题

Abstract: Proxy signature is widely used in large-scale wireless industrial control Internet of things, the efficiency of signature master server can be greatly improved by using proxy signature. A new short proxy signature scheme based on bilinear mapping was proposed to adapt to the application environment with limited bandwidth and weak computing power. Firstly, the security of the proposed scheme was proved based on Computational Diffie-Hellman (CDH) problem and Collusion Attack Algorithm with k traitors (k-CAA) problem under the random oracle model. Then, the performance advantages of the proposed scheme were analyzed with other existing proxy signature and short proxy signature schemes, and the key codes of the proposed scheme were given. The experimental results show that, the proposed scheme performs one scalar multiplication operation and one hash operation in proxy signature generation; two bilinear pairing operation, one scalar multiplication operation and two hash operations in signature verification. Compared with other similar proxy signature schemes, the proposed scheme has advantages in computational performance and is suitable for application scenarios with weak computational power and limited transmission capacity.

Key words: short proxy signature, random oracle model, bilinear pairing, Computational Diffie-Hellman (CDH) problem, Collusion Attack Algorithm with k traitors (k-CAA) problem

中图分类号: