首页 | 官方网站   微博 | 高级检索  
     

高效的可证安全短代理签名方案
引用本文:左黎明,陈祚松,夏萍萍,易传佳.高效的可证安全短代理签名方案[J].计算机应用,2018,38(12):3455-3461.
作者姓名:左黎明  陈祚松  夏萍萍  易传佳
作者单位:1. 华东交通大学 理学院, 南昌 330013;2. 华东交通大学 系统工程与密码学研究所, 南昌 330013
基金项目:国家自然科学基金资助项目(11761033);江西省教育厅科技项目(GJJ170386,GJJ161417);江西省研究生创新专项资金项目(YC2017-S257)。
摘    要:代理签名在大规模无线工控物联网中应用广泛,利用代理签名可以大大提高签名主服务器的效率。为适应带宽受限和计算能力弱的应用环境,提出了一个基于双线性映射的短代理签名方案。首先,在随机预言机模型下基于计算Diffie-Hellman(CDH)问题和k-碰撞攻击算法(k-CAA)问题证明了该方案的安全性。然后,与其他现有代理签名和短代理签名方案进行了性能上的优势分析,并给出了该方案实现的关键代码。实验结果表明,所提方案在代理签名生成时进行了1次标量乘运算和1次哈希运算,签名验证时进行了2次双线性对运算、1次标量乘运算和2次哈希运算,与其他同类代理签名方案相比计算性能上具有优势,适用于计算能力较弱和传输能力受限的应用场景。

关 键 词:短代理签名  随机预言机模型  双线性对  计算Diffie-Hellman问题  k-碰撞攻击算法问题  
收稿时间:2018-06-08
修稿时间:2018-07-10

Efficient and provably secure short proxy signature scheme
ZUO Liming,CHEN Zuosong,XIA Pingping,YI Chuanjia.Efficient and provably secure short proxy signature scheme[J].journal of Computer Applications,2018,38(12):3455-3461.
Authors:ZUO Liming  CHEN Zuosong  XIA Pingping  YI Chuanjia
Affiliation:1. School of Science, East China Jiaotong University, Nanchang Jiangxi 330013, China;2. Institute of Systems Engineering and Cryptography, East China Jiaotong University, Nanchang Jiangxi 330013, China
Abstract:Proxy signature is widely used in large-scale wireless industrial control Internet of things, the efficiency of signature master server can be greatly improved by using proxy signature. A new short proxy signature scheme based on bilinear mapping was proposed to adapt to the application environment with limited bandwidth and weak computing power. Firstly, the security of the proposed scheme was proved based on Computational Diffie-Hellman (CDH) problem and Collusion Attack Algorithm with k traitors (k-CAA) problem under the random oracle model. Then, the performance advantages of the proposed scheme were analyzed with other existing proxy signature and short proxy signature schemes, and the key codes of the proposed scheme were given. The experimental results show that, the proposed scheme performs one scalar multiplication operation and one hash operation in proxy signature generation; two bilinear pairing operation, one scalar multiplication operation and two hash operations in signature verification. Compared with other similar proxy signature schemes, the proposed scheme has advantages in computational performance and is suitable for application scenarios with weak computational power and limited transmission capacity.
Keywords:short proxy signature  random oracle model  bilinear pairing  Computational Diffie-Hellman (CDH) problem  Collusion Attack Algorithm with k traitors (k-CAA) problem  
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号