计算机工程

• 安全技术 • 上一篇    下一篇

基于二次剩余的匿名代理者签密方案

刘 祯1,杨启良2,杨 波1   

  1. (1. 陕西师范大学计算机科学学院,西安710062; 2. 树德科技大学信息学院,中国台湾高雄82445)
  • 收稿日期:2014-02-24 出版日期:2015-02-15 发布日期:2015-02-13
  • 作者简介:刘 祯(1989 - ),女,硕士,主研方向:信息安全,密码学;杨启良,学士;杨 波,教授。
  • 基金项目:
    国家自然科学基金资助项目(61272436, 61370224);广东省自然科学基金资助项目(10351806001000000)。

Anonymous Proxy Signcryption Scheme Based on Quadratic Residue

LIU Zhen 1,YANG Qiliang 2,YANG Bo 1   

  1. (1. School of Computer Science,Shaanxi Normal University,Xi’an 710062,China;2. College of Informatics,Shu-Te University,Kaohsiung 82445,Taiwan,China)
  • Received:2014-02-24 Online:2015-02-15 Published:2015-02-13

摘要: 由于现有签密方案大多基于双线性对,配对运算计算量较大,且实现效率不高,不能满足对代理签密者的匿名要求,因此无需配对的签密方案是密码学的研究方向。而基于二次剩余的签名方案不仅具有描述简单,能够抵抗选择密文攻击的优点,且相较于基于配对的签名方案具有更高的实现效率。为此,将二次剩余的方法应用到签密方案中,并结合匿名性,提出一种基于二次剩余的匿名代理者签密方案。分析结果表明,该方案具有匿名性与公开验证性。

关键词: 代理者签密, 匿名性, 二次剩余, 随机预言机模型, 公开验证, 可追踪性, 不可否认性

Abstract: Most of the existing signcryptions are based on bilinear pairing,but the signcryption without bilinear pairing is a research of cryptography,because the pairing operation requires a lot of computations,and it can not anonymous the proxy signcrypter. The signature scheme based on quadratic residue is widely used with its advantages such as simple description,resistance of chosen ciphertext attack and high efficiency. Its efficient is higher compared with signcryption schemes based on bilinear pairing. This paper adds anonymity to the scheme based on quadratic residue to realize anonymous proxy signcryption. Analysis results show that the scheme not only provides anonymity,but also provides public verifiability.

Key words: proxy signcryption, anonymity, quadratic residue, random oracle model, public verification, traceability, non-repudiation

中图分类号: