首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
新的基于身份的广义指定多验证者签名   总被引:1,自引:0,他引:1       下载免费PDF全文
在一个指定验证者签名方案中,只有指定的验证者才能验证签名的有效性。论文基于双线性对提出一种新的基于身份的广义指定多个验证者签名方案。新方案采用引进两个独立PKG的方法,在一定程度上消除了单个PKG可以伪造用户签名的安全缺陷。证明了在BDH问题假设和随机预言机下新方案是安全的。  相似文献   

2.
提出了无证书的广义指定多个验证者的签名体制,将指定单个验证者签名方案扩展到了指定多个验证者的签名方案。该方案满足所有无证书体制下指定验证者签名所要满足的安全要求,它的不可伪造性依赖于BDH假设,并且在随机预言模型下证明了该方案能够抵抗适应性选择消息和身份攻击。  相似文献   

3.
In an ID-based universal designated verifier signature scheme, a single signer generates a signature that can only be verified by a designated verifier using a simplified public identity such as an e-mail address. In this paper, we expand the scheme to a multi-user setting for generating and verifying signatures in practical applications. An ID-based multi-signer universal designated multi-verifier signature scheme based on bilinear pairings is proposed that allows a set of multi-signer to cooperatively generate a signature and designate a set of multi-verifier to verify it. The security of the proposed scheme is demonstrated to be resistant to existentially forgery from adaptive chosen-message and chosen-ID attacks under the Bilinear Diffie-Hellman problem.  相似文献   

4.
A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.  相似文献   

5.
A novel identity-based strong designated verifier signature scheme   总被引:1,自引:0,他引:1  
Unlike ordinary digital signatures, a designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. In a strong designated verifier signature scheme, no third party can even verify the validity of a designated verifier signature, since the designated verifier’s private key is required in the verifying phase. Firstly, this paper proposes the model of identity-based strong designated verifier signature scheme based on bilinear pairings by combining identity-based cryptosystem with the designated verifier signature scheme, and then, provides one concrete strong identity-based designated verifier signature scheme, which has short size of signature, low communication and computational cost. We provide security proofs for our scheme.  相似文献   

6.
分析了两个基于身份的指定验证者签名方案(Zhang方案和Li-Zheng-Zhu方案),指出了两个签名方案不满足指定验证者签名的安全特性:Zhang方案不满足不可伪造性,Li-Zheng-Zhu方案中非指定验证者可以验证签名的有效性,不满足指定验证性。对两个方案进行了改进,改进后的Zhang方案满足不可伪造性,并具有与原方案相同的效率;改进后的Li-Zheng-Zhu方案不仅满足指定验证性,而且减少了一个双线性对运算,具有较高的效率。  相似文献   

7.
A novel ID-based designated verifier signature scheme   总被引:3,自引:0,他引:3  
In a designated verifier signature scheme, only the designated verifier can verify the validity of a signature. This paper studies an Identity-based Strong Designated Verifier Signature (IBSDVS) scheme based on bilinear pairings by combining ID-based cryptosystem with the designated verifier signature scheme. We analyze the security of the scheme and the result shows that the security of our proposed scheme is closely related to the Bilinear Diffie-Hellman problem and the scheme is against delegatability attack.  相似文献   

8.
广义指定多个验证者签名允许签名持有者指定多个签名验证者,有序多重签名则可满足多个签名者以严格的次序进行签名的要求。根据上述特性,提出一种基于身份的广义指定多个验证者有序多重签名方案,采用类短签名的形式构造签名,并在随机预言模型下证明方案的安全性。分析结果表明,该方案具有较高的效率,可抵抗适应性选择消息和身份攻击。  相似文献   

9.
Recently, Kang et al. proposed a new identity-based strong designated verifier signature scheme (ID-SDVS) and identity-based designated verifier proxy signature scheme (ID-DVPS). They claimed that their schemes are unforgeable. However, we found out that their schemes are universally forgeable in the sense that anyone can forge valid ID-SDVS and ID-DVPS on an arbitrary message without the knowledge of the secret key of either the signer or the designated verifier. Finally, we propose an improved ID-SDVS which is unforgeable. We give formal security proof of universal unforgeability of our scheme. We also give an improved ID-DVPS.  相似文献   

10.
对李明祥等提出的一个基于身份的强指定验证者签名方案进行了安全性分析,指出其存在两个重大的安全缺陷:(1)该方案是可以普遍伪造的;(2)该方案不是一个指定验证者签名方案,非指定验证者也可以验证签名的有效性。提出了改进方案,克服了原方案的缺陷,提高了系统的安全性,并保留了原方案的优点。  相似文献   

11.
基于身份的强指定验证者签名方案   总被引:1,自引:1,他引:0       下载免费PDF全文
分析基于身份的指定验证者签名方案的漏洞,指出任何人只要获取一个签名就可以验证以后所有的签名,并提出一个高效的基于身份的强指定验证者签名方案。该方案结合了单向认证密钥交换协议中的发送者前向安全性和已知密钥安全性等特点。与已知的基于身份的强指定验证者签名方案相比,该方案具有更强的安全性,且签名和验证算法更高效。  相似文献   

12.
在有些情况下, 需要将验证者限定为某一个人。 利用基于身份的密码体制, 提出了一种强指定验证人签名和一种强指定验证人多重代理签名, 并对其安全性进行了分析。 在签名代价和验证代价上, 提出的强指定验证人签名比Kang等人的方案要低。提出的强指定验证人多重代理签名可以同时授权给n个代理人, 可以有效防止代理签名人对签名权的滥用。  相似文献   

13.
给出一种可容忍信息泄露的指定验证者盲代理签名方案,它具有一些代理签名方案的新特点:匿名性和可追踪性。指定验证者在验证代理签名之后只能确信代理签名是代表原始签名者的签名而无法确定代理签名者身份;当出现争议时,指定验证者可通过代理群管理员追查出代理签名者的身份。提出的方案较好地解决了基于身份指定验证者签名中的密钥托管问题。与同类方案相比,签名和验证次数少、交互次数更少。  相似文献   

14.
Li-Wang(2006)提出了一种通用指定验证者环签名方案(UDVRS)。该方案允许签名者指定一个验证者并产生一个指定验证者环签名,使得只有指定验证者才能验证该环签名。通过对Li-Wang提出的通用环签名方案进行分析,指出了该方案并不满足指定验证者性质,给出了攻击方法。为避免该缺陷,对Li-Wang通用指定验证者环签名方案进行改进,改进后的方案是可证安全的。  相似文献   

15.
为了克服基于身份部分盲签名方案的安全性依赖强和签名验证计算开销大等缺陷,结合基于身份的部分盲签名和服务器辅助验证签名,提出了基于身份的服务器辅助验证部分盲签名体制,将签名验证的大部分计算任务委托服务器执行,有效减少了验证者的计算开销。利用双线性映射,设计了一个具体的基于身份服务器辅助验证部分盲签名方案,并在标准模型下证明所提方案是安全的。分析结果表明,所提方案大幅降低了签名验证算法的计算复杂度,在效率上优于Li方案(LI F,ZHANG M,TAKAGI T.Identity-based partially blind signature in the standard model for electronic cash.Mathematical and Computer Modelling,2013,58(1):196-203)和Zhang方案(ZHANG J,SUN Z.An ID-based server-aided verification short signature scheme avoid key escrow.Journal of Information Science and Engineering,2013,29(3):459-473)。  相似文献   

16.
Universal designated verifier signature was first introduced by Steinfeld, Bull, Wang and Pieprzyk in Asiacrypt 2003. In the universal designated verifier signature scheme, any holder of a signature can designate the signature to any desired designated verifier, such that only the designated verifier will believe that the signature holder holds a valid signature. In SecUbiq’05 [Zhang Fangguo, Susilo Willy, Mu Yi, Chen Xiaofeng, 2005. Identity-based universal designated verifier signatures. In: The First International Workshop on Security in Ubiquitous Computing Systems, Nagasaki, Japan, LNCS 3823. Springer-Verlag, Berlin, pp. 825-834] first extended this notion to the identity based setting and proposed two identity based universal designated verifier signature schemes. However, the security of their scheme is based on the random oracle model. Up to now, there is no provably secure identity based universal designated verifier signature scheme in the standard model. In this paper, we propose the first identity based universal designated verifier signature scheme whose security can be proven in the standard model based on the hardness of the computational Diffie-Hellman (CDH) problem.  相似文献   

17.
无证书的指定多个验证者代理签名方案   总被引:3,自引:1,他引:2       下载免费PDF全文
无证书的签名体制解决了传统公钥密码体制中的证书管理问题和基于身份密码体制中的密钥托管问题。代理签名允许原始签名者将自己的签名权委托给代理签名人。指定多个验证者签名方案允许签名者指定多个签名的验证者,只有这些指定的验证者们可以验证签名的有效性,但他们却不能向其他人证明这一事实。结合这三者的优势提出了无证书的指定多个验证者代理签名方案和其要满足的安全要求,并对其安全性做了分析,分析表明该方案满足无证书的指定多个验证者代理签名方案所要满足的安全要求,适于实际应用。  相似文献   

18.
基于身份的指定验证者代理签名方案*   总被引:2,自引:2,他引:0  
在代理签名中,原始签名人能将其数字签名权力委托给代理签名人;在指定验证者签名方案中,只有事先指定的验证者才能验证签名的有效性.综合上述两种方案的优点,利用Weil对的双线性映射,构造了一个基于身份的指定验证者代理签名方案,并对其安全性进行简要的分析.  相似文献   

19.
In this paper we present a designated verifier-set signature (DVSS), in which the signer allows to designate many verifiers rather than one verifier, and each designated verifier can verify the validity of signature by himself. Our research starts from identity-based aggregator (IBA) that compresses a designated set of verifier’s identities to a constantsize random string in cryptographic space. The IBA is constructed by mapping the hash of verifier’s identity into zero or pole of a target curve, and extracting one curve’s point as the result of aggregation according to a specific secret. Considering the different types of target curves, these two IBAs are called as zeros-based aggregator and poles-based aggregator, respectively. Based on them, we propose a practical DVSS scheme constructed from the zero-pole cancellation method which can eliminate the same elements between zeros-based aggregator and poles-based aggregator. Due to this design, our DVSS scheme has some distinct advantages: (1) the signature supporting arbitrary dynamic verifiers extracted from a large number of users; and (2) the signature with short and constant length. We rigorously prove that our DVSS scheme satisfies the security properties: correctness, consistency, unforgeability and exclusivity.  相似文献   

20.
为解决传统签名方案中验证者具有相同验证权限的问题,提出一个基于身份的链式验证签名方案。在该方案中,签名验证者要验证签名的有效性必须经过链式验证授权组中所有成员的依次授权,即使链式验证授权组中的所有成员合谋,也不能验证签名的有效性。该方案可以方便地增加或删除链式验证授权组中的成员,维护签名验证者和链式验证授权者的子秘密。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号