高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

无随机预言机下的指定验证者代理签名方案

明洋 王育民

明洋, 王育民. 无随机预言机下的指定验证者代理签名方案[J]. 电子与信息学报, 2008, 30(3): 668-671. doi: 10.3724/SP.J.1146.2006.01661
引用本文: 明洋, 王育民. 无随机预言机下的指定验证者代理签名方案[J]. 电子与信息学报, 2008, 30(3): 668-671. doi: 10.3724/SP.J.1146.2006.01661
Ming Yang, Wang Yu-min . Designated Verifier Proxy Signature Scheme without Random Oracles[J]. Journal of Electronics & Information Technology, 2008, 30(3): 668-671. doi: 10.3724/SP.J.1146.2006.01661
Citation: Ming Yang, Wang Yu-min . Designated Verifier Proxy Signature Scheme without Random Oracles[J]. Journal of Electronics & Information Technology, 2008, 30(3): 668-671. doi: 10.3724/SP.J.1146.2006.01661

无随机预言机下的指定验证者代理签名方案

doi: 10.3724/SP.J.1146.2006.01661
基金项目: 

国家自然科学基金(60473027)资助课题

Designated Verifier Proxy Signature Scheme without Random Oracles

  • 摘要: 在指定验证者代理签名中,原始签名者把自己的签名权力授权给一个代理签名者,后者可以代表前者签名消息,但是仅仅只有指定验证者能够相信签名的有效性。已知的指定验证者代理签名方案的安全性证明都是在随机预言机模型中的,该文中基于Waters签名方案,首次提出无随机预言机下可证安全的指定验证者代理签名方案。在弱Gap Bilinear Diffie-Hellman假设下,证明所提方案能够抵抗适应性选择消息攻击下的存在性伪造。
  • Mambo M, Usuda K, and Okamoto E. Proxy signature fordelegating signing operation. Proceedings of the 3rd ACMConference on Computer and Communications Security, NewDelhi, India, 1996: 48-57.[2]Dai Jiazhu, Yang Xiaohu, and Dong Jinxiang. Designated-receiver proxy signature scheme for electronic commerce.Proceedings of IEEE International Conference on Systems,Man and Cybernetics, Hyatt Regency, Washington, D.C.,USA, 2003, Vol.1: 384-389.[3]Wang G. Designated-verifier proxy signatures for e-commerce.Proceedings of IEEE International Conference on Multimediaand Expo, Taibei, Taiwan, 2004, Vol.3: 1731-1734.[4]Li X, Chen K, and Li S. Designated-verifier proxy signaturesfor e-commerce from bilinear pairings. Proceedings of the16th International Conference on Computer Communication,Beijing, China, 2004: 1249-1252.[5]Cao T, Lin D, and Xue R. ID-based designated verifier proxysignatures[J].IEE Proceedings Communication.2005, 152(6):989-994[6]Huang Xinyi, Mu Yi, and Susilo W, et al.. Short designatedverifier proxy signature from pairings. Proceedings of theInternational Conference on Embedded and UbiquitousComputing Workshops, Nagasaki, Japan, LNCS 3823, Berlin:Springer-Verlag, 2005: 835-844.[7]Lu Rongxing, Cao Zhenfu, and Dong Xiaolei, et al..Designated verifier proxy signature scheme from bilinearpairings. Proceedings of the First International Multisymposiumson Computer and Computational Sciences,Hangzhou, China, 2006: 40-47.[8]Waters B. Efficient identity-based encryption withoutrandom oracles[J].Proceedings of EUROCRYPT05, Aarhus,Denmark, LNCS.3494, Berlin:-[9]Laguillaumie F, Libert B, and Quisquater J J. Universaldesignated verifier signatures without random oracles ornon-black box assumptions. Proceedings of the 5thInternational Conference Security and Cryptography forNetworks, Maiori, Italy, LNCS 4116. Berlin: Springer-Verlag,2006: 63-77.
  • 加载中
计量
  • 文章访问数:  3153
  • HTML全文浏览量:  84
  • PDF下载量:  773
  • 被引次数: 0
出版历程
  • 收稿日期:  2006-10-30
  • 修回日期:  2007-04-02
  • 刊出日期:  2008-03-19

目录

    /

    返回文章
    返回