高效可证明安全的无证书代理签名方案
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Provably Secure Efficient Certificateless Proxy Signature Scheme
  • 作者:汤永利 ; 王菲菲 ; 叶青 ; 闫玺玺
  • 英文作者:TANG Yongli;WANG Feifei;YE Qing;YAN Xixi;College of Computer Science and Technology, Henan Polytechnic University;
  • 关键词:无证书密码体制 ; 代理签名 ; 椭圆曲线离散对数难题 ; 随机预言机模型
  • 英文关键词:certificateless public key cryptography;;proxy signature;;elliptic curve discrete logarithm problem;;ran dom oracle model
  • 中文刊名:KXTS
  • 英文刊名:Journal of Frontiers of Computer Science and Technology
  • 机构:河南理工大学计算机科学与技术学院;
  • 出版日期:2016-06-23 14:01
  • 出版单位:计算机科学与探索
  • 年:2016
  • 期:v.10;No.96
  • 基金:国家自然科学基金No.61300216;; 河南省科技厅国际科技合作计划No.152102410048;; 河南省基础与前沿技术研究No.142300410147;; 河南省教育厅自然科学研究项目Nos.12A520021,16A520013~~
  • 语种:中文;
  • 页:KXTS201609010
  • 页数:8
  • CN:09
  • ISSN:11-5602/TP
  • 分类号:86-93
摘要
为提高无证书代理签名方案的计算效率,提出了一个高效的无证书代理签名方案。该方案的安全性基于椭圆曲线离散对数难题,不使用双线性对,其效率比现有的无证书代理签名方案有很大提高。在部分代理钥生成阶段只需1个标量乘,在部分代理钥验证阶段只需2个标量乘,在代理签名阶段只需1个标量乘,在代理签名验证阶段只需6个标量乘,且签名长度较短。所提方案对于超级攻击者在适应性选择消息与身份下是存在性不可伪造的,适用于对计算和存储等资源有严格限制的实际应用场合。
        To improve the computational efficiency, this paper proposes an efficient provably secure certificateless proxy signature scheme based on elliptic curve discrete logarithm problem, avoiding bilinear pairing. The proposed scheme is more computationally efficient than the existing schemes. Its generate- partial- proxy- key algorithm needs one scalar multiplication, its validate-partial-proxy-key algorithm needs two scalar multiplications, and its signing algorithm only needs one scalar multiplication, its validation algorithm only needs six scalar multiplications. Furthermore,its signature length is shorter. The proposed scheme is existentially unforgeable in adaptive chosen message and identity for super adversary, and is particularly suitable for practical applications with limited bandwidth and powerconstrained devices.
引文
[1]Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]//LNCS 2894:Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security,Taipei,China,Nov 30-Dec 4,2003.Berlin,Heidelberg:Springer,2003:452-473.
    [2]Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[C]//Proceedings of the 1996 ACM Conference on Computer and Communications Security,New Delhi,India,Mar 1996.New York:ACM,1996:48-57.
    [3]Mambo M,Usuda K,Okamoto E.Proxy signatures:delegation of the power to sign messages[J].IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences,1996,E79-A(9):1338-1354.
    [4]Shi Wenbo,He Debiao,Gong Peng.On the security of a certificateless proxy signature scheme with message recovery[J].Mathematical Problems in Engineering,2013,57(9/10):2510-2518.
    [5]Li X,Chen K,Sun L.Certificateless signature and proxy signature schemes from bilinear pairings[J].Lithuanian Mathematical Journal,2005,45(1):76-83.
    [6]Lu Rongbo,He Dake,Wang Changji.Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings[C]//Proceedings of the 8th ACIS International Conference on Software Engineering,Artificial Intelligence,Networking,and Parallel/Distributed Computing,Qingdao,China,Jul 30-Aug 1,2007.Washington:IEEE Computer Society,2007:285-290.
    [7]Chen Hu,Zhang Futai,Song Rushun.Certificateless proxy signature scheme with provable security[J].Journal of Software,2009,20(3):692-701.
    [8]Xiong Hu,Li Fagen,Qin Zhiguang.A provably secure proxy signature scheme in certificateless cryptography[J].Informatica,2010,21(2):277-294.
    [9]Zhang Lei,Zhang Futai,Wu Qianhong.Delegation of signing rights using certificateless proxy signatures[J].Information Sciences,2012,184(1):298-309.
    [10]Seo S H,Choi K Y,Hwang J Y,et al.Efficient certificateless proxy signature scheme with provable security[J].Information Sciences,2012,188:322-337.
    [11]Xu Chungen,Zhang Aohong,Han Mu,et al.Certificateless proxy signature scheme based on discrete logarithm problem[J].Journal of Nanjing University of Science and Technology:Natural Science,2010,34(6):733-737.
    [12]Deng Lunzhi,Zeng Jiwen,Qu Yunyun.Certificateless proxy signature from RSA[J].Mathematical Problems in Engineering,2014(9).doi:10.1155/2014/373690.
    [13]Wang Yafei,Zhang Ruizhe.Strongly secure certificateless signature scheme without pairings[J].Journal on Communications,2013,34(2):94-100.
    [14]Pointcheval D,Stern J.Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000,13(3):361-396.
    [11]许春根,张傲红,韩牟,等.一种基于离散对数问题的无证书代理签名方案[J].南京理工大学学报:自然科学版,2010,34(6):733-737.
    [13]王亚飞,张睿哲.强安全无对的无证书签名方案[J].通信学报,2013,34(2):94-100.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700