首页 | 本学科首页   官方微博 | 高级检索  
     检索      

一种灵活的基于身份的签名方案
引用本文:崔永贞,李俊岭,辛向军.一种灵活的基于身份的签名方案[J].数学的实践与认识,2010,40(11).
作者姓名:崔永贞  李俊岭  辛向军
基金项目:河南省基础与前沿技术研究项目,河南省教育厅自然科学基金
摘    要:在基于身份的密钥提取过程中,使密钥生成器在私钥中嵌入随机数,从而使得密钥提取具有较好的灵活性,使得用户对一个身份可具备多个私钥,这无疑会增加密钥使用的安全性;基于这种新的密钥提取思路,给出一个基于身份的签名体制,新的密钥提取方式使得它具有更好的安全性和灵活性;新的基于身份的签名体制中具有最少对运算,因此,与类似的方案相比,其具备较好的计算效率;新签名体制的安全性依赖于k-合谋攻击问题(k-CAAP)的困难性,其在适应性选择消息和ID攻击下具备强不可伪造性,并且其安全性证明具有紧规约性.

关 键 词:签名  基于身份的签名  紧规约  双线性对

A Flexible ID-based Signature Scheme
CUI Yong-zhen,LI Jun-ling,XIN Xiang-jun.A Flexible ID-based Signature Scheme[J].Mathematics in Practice and Theory,2010,40(11).
Authors:CUI Yong-zhen  LI Jun-ling  XIN Xiang-jun
Abstract:During the key extract phase,making the private key generator embed random in the private key makes the key extract more flexible.This idea can make a user have many private keys for an identity,which can increase the security of the use of the private keys with no doubt.Based on this novel idea for key extract,a new ID-based signature scheme is proposed.The novel key extract makes the ID-based signature scheme more secure and flexible.There is the least pairing operation in the new ID-based signature scheme,which makes it has more efficient computation than the other schemes of this kind.The security of our ID-based signature scheme depends on the hardness of k-CAA(collusion attack algorithm with k traitors)problem.The new scheme has the property of strong unforgeability under the adaptive chosen-message attack and ID attack,and the security proof has tight reductions.
Keywords:signature  ID-based signature  tight reduction  bilinear pairing
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号