您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

J4

• 论文 • 上一篇    下一篇

两种基于生物特征信息的身份签名方案

刘晓东,蒋亚丽,李大兴   

  1. 山东大学 网络信息安全研究所, 山东 济南 250100
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2006-10-24 发布日期:2006-10-24
  • 通讯作者: 刘晓东

Two biometric identities based signature schemes

LIU Xiao-dong, JIANG Ya-li, LI Da-xing   

  1. Institute of Network Security, Shandong University, Jinan 250100, Shandong, China
  • Received:1900-01-01 Revised:1900-01-01 Online:2006-10-24 Published:2006-10-24
  • Contact: LIU Xiao-dong

摘要: 提出两种基于生物特征信息的身份签名方案。方案一使用签名者的生物特征信息来构造其公钥,验证者不需事先获取签名者的公钥信息,只需由签名者出示其生物特征信息便可重构出其公钥以完成验证操作,使验证操作更加便利直观。方案二使用签名者的生物特征信息来构造其私钥,使私钥的存储不依赖于硬件载体,从根本上避免了私钥的损坏或丢失给签名者带来的损失与不便。上述两种身份签名方案由Dodis等提出的生物特征信息提取算法fuzzy extractor在Liu方案和经典BLS短签名方案的基础上构造。最后,针对上述方案可能存在的攻击提出预防对策。

关键词: 身份签名, BLS短签名方案 , Diffie-Hellman假设, 双线性对, fuzzy extractor算法

Abstract: In the first scheme, the signer's public key was constructed from his biometric data. The verifier performed verification successfully by asking signer to show his biometric data, which makes the verifying operation more visible and convenient. In the second scheme, since the private key of the signer was constructed from the biometric data of the signer, it does not need to be placed in hardware, and therefore there is no worry about the loss and inconvenience caused by the fault of the hardware. These two schemes were constructed from the fuzzy extractor method proposed by Dodis, Liu scheme and classical BLS short signature scheme. Finally, two possible attacks on the schemes mentioned above were described and the ways to combat them were suggested.

Key words: BLS short signature scheme , Diffie-Hellman suppose, bilinear pairing, fuzzy extractor algorithm, identity based signature

中图分类号: 

  • TP309
[1] 胡江红,杜红珍,张建中. 两类无证书聚合签名方案的分析与改进[J]. 山东大学学报(理学版), 2016, 51(7): 107-114.
[2] 朱斌瑞,秦静,韩斐. 基于生物特征的可搜索加密[J]. 山东大学学报(理学版), 2016, 51(5): 78-86.
[3] 农强, 黄振杰, 黄茹芬. 对一种无证书聚合签名方案的改进[J]. 山东大学学报(理学版), 2015, 50(11): 52-59.
[4] 樊爱宛, 夏栋梁, 杨照峰. 两种无证书聚合签名方案的安全性分析及改进[J]. 山东大学学报(理学版), 2015, 50(09): 42-48.
[5] 侯红霞1,2,张雪锋2,董晓丽2. 改进的无证书聚合签名方案[J]. J4, 2013, 48(09): 29-34.
[6] 张方国. 椭圆曲线在密码中的应用:过去,现在,将来…[J]. J4, 2013, 48(05): 1-13.
[7] 景旭1,2,3, 何东健1*. 无完全可信PKG身份签名的分层CES方案[J]. J4, 2012, 47(9): 7-14.
[8] 吴磊1 ,孔凡玉2 . 一种高效的基于身份代理环签名方案[J]. J4, 2009, 44(1): 40-43 .
[9] 许 艳,于 佳,李大兴 . 基于身份的动态门限盲签名方案[J]. J4, 2008, 43(1): 55-59 .
[10] 于 佳,李大兴 . 分层的基于身份的动态门限签名方案[J]. J4, 2006, 41(1): 125-129 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!