首页 | 官方网站   微博 | 高级检索  
     

面向分级身份密码批验签的错误签名混合筛选算法
引用本文:徐国愚,王颖锋,马小飞,王科锋,颜若愚.面向分级身份密码批验签的错误签名混合筛选算法[J].计算机应用,2017,37(1):217-221.
作者姓名:徐国愚  王颖锋  马小飞  王科锋  颜若愚
作者单位:河南财经政法大学 计算机与信息工程学院, 郑州 450002
基金项目:国家自然科学基金资助项目(61602153,U1404605);河南省教育厅科学技术研究重点项目(15A520044,14A520079);2016年河南省科技攻关计划项目(162102210273)。
摘    要:针对分级身份密码(HIBC)批验签过程中的错误签名快速识别问题,设计实现了一种错误签名混合筛选算法。针对HIBC签名算法不完全聚合的特点,首先将所有签名作为树叶构造平衡二叉树,然后通过拆分攻克与指数测试方法查找错误签名,并且利用计算中间值的关联性减少计算开销。算法性能分析表明,当批验签中错误签名数大于2时,该算法计算开销低于独立测试、通用折半拆分、指数测试以及裁剪搜索算法,能够有效筛选出HIBC批验签中的错误签名,可以应用在云计算认证等应用场景中。

关 键 词:批验签  错误签名筛选算法  分级身份密码  平衡二叉树  云计算  
收稿时间:2016-08-06
修稿时间:2016-09-08

Hybrid algorithm for identifying error signatures in hierarchical identity based cryptography batch verification
XU Guoyu,WANG Yingfeng,MA Xiaofei,WANG Kefeng,YAN Ruoyu.Hybrid algorithm for identifying error signatures in hierarchical identity based cryptography batch verification[J].journal of Computer Applications,2017,37(1):217-221.
Authors:XU Guoyu  WANG Yingfeng  MA Xiaofei  WANG Kefeng  YAN Ruoyu
Affiliation:College of Computer and Information Engineering, Henan University of Economics and Law, Zhengzhou Henan 450002, China
Abstract:Focusing on the issue of identifying error signatures in Hierarchical Identity Based Cryptography (HIBC) batch verification, a hybrid algorithm of identifying the error signatures was proposed. Firstly, a balanced binary tree was built which used all signatures as the leaves. Secondly, divide-and-conquer and exponent testing methods were used to find error signatures. Meanwhile, the relevance of temporary computing values was used to reduce computing cost. The performance analyses show that the proposed algorithm costs less computation than the individual, the generalized binary splitting, the exponential and the triple pruning search algorithms when there are more than two error signatures. The proposed algorithm can effectively identify error signatures in HIBC batch verification and can be applied in cloud computing authentication.
Keywords:batch verification  error signature identifying algorithm  Hierarchical Identity Based Cryptography (HIBC)  balanced binary tree  cloud computing  
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号