您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

《山东大学学报(理学版)》 ›› 2019, Vol. 54 ›› Issue (1): 79-87.doi: 10.6040/j.issn.1671-9352.2.2018.056

• • 上一篇    

一种基于证书的短签名方案

左黎明1,2,3,陈兰兰1,3,周庆1,3   

  1. 1.华东交通大学理学院, 江西 南昌 330013;2.江西省经济犯罪侦查与防控技术协同创新中心, 江西 南昌 330013;3.华东交通大学系统工程与密码学研究所, 江西 南昌 330013
  • 发布日期:2019-01-23
  • 作者简介:左黎明(1981— ),男,硕士,副教授,硕士生导师,研究方向为信息安全. E-mail:limingzuo@126.com
  • 基金资助:
    国家自然科学基金资助项目(11761033);江西经济犯罪侦查与防控技术协同创新中心开放基金资助课题(JXJZXTCX-001);江西省教育厅科技项目(GJJ161417,GJJ170386)

A certificate-based short signature scheme

ZUO Li-ming1,2,3, CHEN Lan-lan1,3, ZHOU Qing1,3   

  1. 1. School of Science, East China Jiaotong University, Nanchang 330013, Jiangxi, China;
    2. Collaborative Innovation Center for Economics Crime Investigation and Prevention Technology, Jiangxi Province, Nanchang 330013, Jiangxi, China;
    3. SEC Institute, East China Jiaotong University, Nanchang 330013, Jiangxi, China
  • Published:2019-01-23

摘要: 结合基于证书的公钥密码体制和短签名两者优势,提出了一种基于证书的短签名方案。在随机预言机模型以及k-CAA问题和Inv-CDH问题困难假设下,证明了该方案的安全性,并与几种签名方案进行了理论上的效率对比分析。最后,利用PBC库实现签名方案并与几种典型方案进行了实际运行效率比较。结果表明,提出的方案与采用双线性对的基于证书的Liu方案和基于证书的短签名Li方案相比,平均耗时分别减少了约24.7%和17.5%,与无对的基于证书的Li方案和Zhou方案以及短签名Boneh方案平均耗时接近。

关键词: 基于证书公钥密码体制, 短签名, k-CAA, Inv-CDH, 随机预言机模型

Abstract: Combining the merits of certificate-based public key cryptography and short signatures, a certificate-based short signature scheme was proposed. Firstly, based on the k-CAA problem and Inv-CDH problem, the security of the scheme was proved in the random oracle model. Then, the signature scheme was compared with several schemes in the efficiency, theoretically. Finally, the signature scheme was implemented by the PBC library and was compared with several typical schemes in the actual operating efficiency. The result shows that the average time consumption is reduced by about 24.7% and 17.5% compared with the certificate-based Lius scheme with bilinear pairings and the certificate-based Lis short signature scheme respectively, which is close to the certificate-based Lis and Zhous schemes without bilinear pairings and Bonehs short signature scheme.

Key words: certificate-based public key cryptography, short signature, collusion attack algorithm with k traitors, inverse computational Diffie-Hellman, random oracle model

中图分类号: 

  • TP309.7
[1] GENTRY C. Certificate-based encryption and the certificate revocation problem[C] // International Conference on Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2003: 272-293.
[2] KANG B, PARK J, HAHN S. A certificate-based signature scheme[C] // Cryptolograheres Track Research Conference Held at the RSA Conference. New York: Springer, 2004: 99-111.
[3] LIU J K, BAEK J, SUSILO W, et al. Certificate-based signature schemes without pairings or random oracles[C] // Proceedings of the ISC 2008. Berlin: Springer, 2008: 285-297.
[4] ZHANG J H. On the security of a certificate-based signature scheme and its improvement with pairings[C] // Proceedings of the ISPEC 2009. Berlin: Springer, 2009: 47-58.
[5] 周萍, 何大可. 高效不含双线性对的基于证书签名方案[J]. 计算机应用研究, 2013, 30(5):1504-1507, 1519. ZHOU Ping, HE Dake. Efficient certificate-based signature scheme without pairings[J]. Application Research of Computers, 2013, 30(5):1504-1507, 1519.
[6] HUANG R, NONG Q. An efficient certificate-based verifiable encrypted signature scheme sithout pairings[J]. Journal of Computer Applications, 2014, 13(3/4): 257-267.
[7] ZHANG Y C, LI J G, WANG Z W, et al. A new efficient certificate-based signature scheme[J]. Chinese Journal of Electronics, 2015, 24(04):776-782.
[8] YANG L, LI J. Improved certificate-based signature scheme without random oracles[J]. IET Information Security, 2016, 10(2):80-86.
[9] ZHOU C, CUI Z. Certificate-based signature scheme in the standard model[J]. IET Information Security, 2017, 11(5):256-260.
[10] BONEH D, LYNN B, SHACHAM H. Short signatures from the Weil pairing[C] // Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin: Springer, 2001: 514-532.
[11] LI J G, HUANG X Y, ZHANG Y C, et al. An efficient short certificate-based signature scheme[J]. Journal of Systems & Software, 2012, 85(2):314-322.
[12] WU W, MU Y, SUSILO W. Certificate-based signatures: new definitions and a generic construction from certificateless signatures[C] // Lecture Notes in Computer Science, Vol5379, Berlin: Springer, 2009: 99-114.
[13] 李志敏, 徐馨, 李存华. 高效的基于证书数字签名设计方案[J]. 计算机应用研究, 2012, 29(4):1430-1433, 1444. LI Zhimin, XU Xin, LI Cunhua. Design of efficient certificate-based signature[J]. Application Research of Computers, 2012, 29(4):1430-1433, 1444.
[14] LI J G, WANG Z W, ZHANG Y C. Provably secure certificate-based signature scheme without pairings[J]. Information Sciences, 2013, 233(7):313-320.
[15] 周萍, 何大可, 张文芳. 具有强安全性不含双线性对的基于证书盲签名[J]. 四川大学学报(工程科学版), 2013, 45(4):111-116. ZHOU Ping, HE Dake, ZHANG Wenfang. Strongly secure certificate-based blind signature scheme without pairings[J]. Journal of Sichuan University(Engineering Science Edition), 2013, 45(4):111-116.
[16] 冯达, 王强, 赵译文, 等. 基于SGX的证书可信性验证与软件安全签发系统[J]. 信息网络安全, 2018(3):63-69. FENG Da, WANG Qiang, ZHAO Yiwen, et al. SGX-based certificate credibility verification and secure software issuance system[J]. Netinfo Security, 2018(3):63-69.
[1] 刘晓东,蒋亚丽,李大兴 . 两种基于生物特征信息的身份签名方案[J]. J4, 2007, 42(12): 24-28 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!