首页 | 本学科首页   官方微博 | 高级检索  
     

基于国产密码算法SM9的可追踪属性签名方案
引用本文:唐飞,凌国玮,单进勇.基于国产密码算法SM9的可追踪属性签名方案[J].电子与信息学报,2022,44(10):3610-3617.
作者姓名:唐飞  凌国玮  单进勇
作者单位:1.重庆邮电大学计算机科学与技术学院 重庆 4000652.重庆邮电大学网络空间安全与信息法学院 重庆 4000653.北京数牍科技有限公司 北京 100083
基金项目:国家自然科学基金(61702067),重庆市自然科学基金(cstc2020jcyj-msxmX0343)
摘    要:国产密码算法SM9是我国自主设计的标识密码方案,现已受到各界的广泛关注。为了解决现有属性签名(ABS)方案验签效率不高这一问题,该文基于国密SM9算法构造新的支持树形访问策略的属性签名方案,该方案的验签操作仅需1次双线性对映射和1次指数运算。此外,所提方案具有签名者身份可追踪功能,防止恶意签名者利用属性签名的匿名性进行非法签名操作,从而避免传统属性签名中无条件匿名性下的签名滥用问题。安全分析结果表明所提方案在随机谕言机模型下具有不可伪造性,同时也可抗合谋攻击。与现有的可追踪属性签名方案相比,所提方案的追踪算法效率更高,签名与验签开销也更低。实验结果表明,所提方案验签算法的计算复杂度与策略规模无关,完成1次验签算法仅需2 ms。

关 键 词:国产密码算法SM9    属性签名    可追踪    树形访问策略
收稿时间:2021-07-29

Traceable Attribute Signature Scheme Based on Domestic Cryptographic SM9 Algorithm
TANG Fei,LING Guowei,SHAN Jinyong.Traceable Attribute Signature Scheme Based on Domestic Cryptographic SM9 Algorithm[J].Journal of Electronics & Information Technology,2022,44(10):3610-3617.
Authors:TANG Fei  LING Guowei  SHAN Jinyong
Affiliation:1.College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China2.School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing 400065, China3.Beijing Sudo Technology Co., LTD, Beijing 100083, China
Abstract:The domestic cryptographic SM9 algorithm is an identity-based cryptographic scheme independently designed by our nation, and has progressively attracted attention from all walks of life. In order to resolve the problem of inefficient verification of the existing Attribute-Based Signature(ABS) schemes, a new attribute-based signature scheme is constructed based on SM9 that supports the dendritic access structure strategy. The signature verification cost of the scheme only requires one bilinear pairing operation and one exponential operation. In addition, the proposed scheme has the function of tracking the identity of the signer, preventing the signer from using anonymity to sign illegally, and avoiding the problem of signature abuse under unconditional anonymity in the traditional attribute-based digital signature scheme. The security analysis results demonstrate that the proposed scheme is unforgeable in random oracle model and can withstand collusion attack. Compared with the existing traceable identity attribute-based signature scheme, the proposed scheme avoids complicated operations for identity tracking algorithm, and has lower signature and verification costs. The experimental results indicate that the computational complexity of the verification has nothing to do with the scale of strategy, and it only takes 2 ms to complete a verification.
Keywords:
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号