首页 | 本学科首页   官方微博 | 高级检索  
     

标准模型下基于身份的动态门限代理签名方案
引用本文:于义科,郑雪峰,刘行兵,韩晓光.标准模型下基于身份的动态门限代理签名方案[J].计算机科学,2011,38(3):40-46.
作者姓名:于义科  郑雪峰  刘行兵  韩晓光
作者单位:1. 北京科技大学信息工程学院,北京,100083;南昌航空大学信息工程学院,南昌,330063
2. 北京科技大学信息工程学院,北京,100083
基金项目:本文受国家自然科学基金重点项目(60932003),国家自然科学基金项目(60803123,60674054),北京市重点学科建设项目(XK100080537),北京市重点学科建设项阶-计算机系统结构资助。
摘    要:目前对于基于身份的门限代理签名方案来说,方案的安全性大多是在随机预言模型下证明的,并且这些门限代理签名方案中的代理签名密钥固定。相对而言,设计标准模型下的动态门限代理签名方案更有实际意义。针对以上两个问题,根据Paterson提出的基于身份的签名方案,利用计算Diffi}Hellman问题的困难性在标准模型下设计了一个代理签名密钥可变的动态门限代理签名方案。最后,利用双线性对技术对方案的正确性进行了严格证明,并在CDH困难假设下给出了方案安全性的详细分析过程和证明,结果表明方案是可证安全的和可靠的。

关 键 词:动态门限代理签名,标准模型,基于身份的密码,计算Diffie-Hellman问题

ID-based Proactive Threshold Proxy Signature in the Standard Model
YU Yi-ke,ZHENG Xue-feng,LIU Xing-bing,HAN Xiao-guang.ID-based Proactive Threshold Proxy Signature in the Standard Model[J].Computer Science,2011,38(3):40-46.
Authors:YU Yi-ke  ZHENG Xue-feng  LIU Xing-bing  HAN Xiao-guang
Affiliation:(School of Information Engineering,University of Science and Technology Beijing,Beijing 100083,China);(School of Information Engineering,Nanchang Hangkong University,Nanchang 330063,China)
Abstract:At present, the security of the identity based proactive threshold proxy signature schemes was almost proven in the random oracle model, and the threshold value of these schemes was almost changeless. It is more practical to design threshold proxy signature scheme in the standard model, compared with the existing ones. Aiming at the two problems pointed out above, this paper presented a proactive threshold proxy signature scheme by using the hardness of the computational DifficHellman problem with changeable threshold value, based on the modification of Paterson' proposed identity based signature scheme. At last, the scheme's correctness was exactly proven in terms of bilinear pairing technique and its security analysis and prove were given in detail in the assumption of the computational Diffie-Hellman problem, therefore, this scheme was proven secure and reliable.
Keywords:Proactive threshold proxy signature  Standard model  Identity based cryptography  Computational Diffie-Hellman problem
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号