共查询到17条相似文献,搜索用时 156 毫秒
1.
2.
聚合签名方案允许n个用户对n个消息产生一个签名。2010年,周和杜提出了一个基于身份聚合签名方案,指出他们的方案无法抵抗伪造攻击,当攻击者得到某个成员的签名后,就可以对任意的消息产生有效的签名。提出一个改进方案弥补了安全缺陷,并在随机预言模型下证明了安全性。 相似文献
3.
一种基于身份的聚合签名方案 总被引:3,自引:0,他引:3
赵林森 《计算机应用与软件》2009,26(9):279-281
基于身份的聚合签名方案的提出为验证人员对多个基于身份的签名(这些签名是多个用户分别用自己的身份对多个不同的消息进行签名所得)进行一次性验证提供了方便.基于椭圆曲线中的m-挠群给出一种基于身份的聚合签名方案,并证明该方案在随机预言模型下是安全的.该方案具有两大优点:一是聚合签名减少了签名验证的工作量,提高了工作效率;二是以签名人员的身份作为验证公钥,解决了公钥管理问题. 相似文献
4.
5.
聚合签名主要适用于需要将不同用户对不同消息的签名聚合成一个单一签名的场合。针对已有的基于证书聚合签名方案效率不高的问题,利用双线对构造了一个高效的基于证书聚合签名方案。在随机预言模型中证明了方案在适应性选择消息和身份攻击下是存在性不可伪造的,其安全性归约为计算Diffie-Hellman(CDH)困难问题。分析表明该方案的对运算是常量,而且只需3次双线性对运算,因此运算效率较高。 相似文献
6.
基于证书公钥密码体制是新近提出的一类新型公钥密码体制,它克服了传统公钥密码体制的证书管理问题和基于身份的密码体制固有的密钥托管问题。聚合签名是一种可将不同签名者对不同消息的签名聚合成一个单一签名的数字签名技术。利用双线性对和Computational Diffie-Hellman困难性问题提出了一个基于证书的聚合签名方案,并在随机预言机模型下证明其安全性。 相似文献
7.
针对基于身份双向代理重签名方案需要复杂双线性对运算的问题, 利用哈希函数提出了一种无双线性对的基于身份代理重签名方案。在离散对数困难问题的假设下,证明了该方案在自适应性选择消息攻击下是不可伪造的。该方案具有双向性、多用性、透明性和密钥最优性,避免了双线性对运算。与基于身份的双向代理重签名方案--Shao方案相比,所提方案能够有效降低重签名算法的计算复杂度,提高签名验证算法的计算效率。作为该方案的一个延伸,在其基础上构造了一个聚合代理重签名方案,能将同一时间段内的重签名进行聚合,大大降低了通信带宽。 相似文献
8.
9.
聚合签名能够把多个不同用户对不同消息所产生的不同签名聚合成一个签名,大幅度地提高验证的效率.聚合签密不仅能实现聚合,同时还提供机密性与认证性.本文利用双线性对构造了一个新的基于身份的聚合签密方案,并基于BDH和CDH问题,证明了方案的机密性和不可伪造性.此外,方案还满足可公开验证性,与同类方案相比具有更高的安全性,且运算量更小,效率更高. 相似文献
10.
11.
Kyung-Ah Shim Author Vitae 《Journal of Systems and Software》2010,83(10):1873-1880
An aggregate signature scheme allows n signatures on n distinct messages from n distinct users to aggregate a single signature. The main benefit of such schemes is that they allow bandwidth and computational savings. Since Boneh et al.’s aggregate signature scheme from pairings, there exist several trials for constructing ID-based aggregate signature schemes. However, their computational complexity for pairing computations grows linearly with the number of signers. In this paper, we propose an efficient ID-based aggregate signature scheme with constant pairing computations. We also give its security proof in the random oracle model under the Computational Diffie-Hellman assumption. 相似文献
12.
安全高效的基于身份的部分盲签名方案 总被引:1,自引:0,他引:1
部分盲签名通过在最终的签名数据中添加签名者和用户协商的公共信息,较好地解决了盲签名在匿名性和可控性之间的矛盾。基于Shim(SHIM K A. An ID-based aggregate signature scheme with constant pairing computations. The Journal of Systems and Software, 2010, 83(10): 1873-1880 )提出的基于身份的数字签名方案,提出了一个新的可证安全的基于身份的部分盲签名方案。在随机预言机模型下证明了新方案对自适应选择消息和身份攻击是存在不可伪造的,其安全性能够归约为计算Diffie-Hellman假设。与目前已有的随机预言机模型下基于身份的部分盲签名方案相比,所提方案具有较高的运算效率和较少的通信量。 相似文献
13.
Aggregate signatures allow an efficient algorithm to aggregate n signatures of n distinct messages from n different users into one single signature. The resulting aggregate signature can convince a verifier that the n users did indeed sign the n messages. This feature is very attractive for authentications in bandwidth-limited applications such as reverse multicasts and senor networks. Certificateless public key cryptography enables a similar functionality of public key infrastructure (PKI) and identity (ID) based cryptography without suffering from complicated certificate management in PKI or secret key escrow problem in ID-based cryptography. In this paper, we present a new efficient certificateless aggregate signature scheme which has the advantages of both aggregate signatures and certificateless cryptography. The scheme is proven existentially unforgeable against adaptive chosen-message attacks under the standard computational Diffie–Hellman assumption. Our scheme is also very efficient in both communication and computation and the proposal is practical for many-to-one authentication. 相似文献
14.
15.
Harendra SinghAuthor VitaeGirraj Kumar VermaAuthor Vitae 《Journal of Systems and Software》2012,85(1):209-214
A proxy signature scheme, introduced by Mambo, Usuda and Okamoto, allows an entity to delegate its signing rights to another entity. Identity based public key cryptosystems are a good alternative for a certificate based public key setting, especially when efficient key management and moderate security are required. From inception several ID-based proxy signature schemes have been discussed, but no more attention has been given to proxy signature with message recovery. In this paper, we are proposing provably secure ID-based proxy signature scheme with message recovery and we have proved that our scheme is secure as existential forgery-adaptively chosen message and ID attack. As proposed scheme is efficient in terms of communication overhead and security, it can be a good alternative for certificate based proxy signatures, used in various applications such as wireless e-commerce, mobile agents, mobile communication and distributed shared object systems, etc. 相似文献
16.
17.
A novel ID-based group signature 总被引:4,自引:0,他引:4
Group signatures, first introduced by Chaum and Heyst at Eurocrypt'91, allow individual members of a group to make signatures on behalf of the group while providing the signer's anonymity. Most of the previously proposed group signature schemes are based on the discrete logarithm problem, the public keys of users are not identity information, except for the ID-based scheme proposed by Park et al. in 1997. However, Park et al.'s scheme has a serious problem, which is that all of the previous group signatures signed by other members will be no longer valid if the group is changed. Moreover, the length of the group signature grows linearly with the number of group members, which makes their proposed scheme inefficient. In this paper, the authors propose a novel ID-based group signature scheme which can solve the problem raised by the inclusion of a new group member or the exclusion of an old group member. Meanwhile, compared to Park et al.'s scheme, our scheme requires less computing time for generating the group signature and verifying the group signature. The security of the proposed ID-based group signature scheme is based on the difficulty of computing the discrete logarithm modulo for a composite number. 相似文献