计算机工程

• 安全技术 • 上一篇    下一篇

强不可伪造的双向代理重签名方案

冯 婕 1,蓝才会 1,2,郏伯荣 1,杨小东 2   

  1. (1. 兰州城市学院信息工程学院,兰州730070; 2. 西北师范大学计算机科学与工程学院,兰州730070)
  • 收稿日期:2014-05-13 出版日期:2015-03-15 发布日期:2015-03-13
  • 作者简介:冯 婕(1976 - ),女,讲师、硕士,主研方向:代理重签名,信息管理系统;蓝才会,副教授、博士;郏伯荣,副教授;杨小东,副教 授、博士。
  • 基金项目:
    国家自然科学基金资助项目(61262057,61163038,61063041);国家档案局科技计划基金资助项目(2014-X-33);甘肃省自然科 学基金资助项目(1308RJYA039);兰州市科技计划基金资助项目(2013-4-22);西北师范大学青年教师科研能力提升计划基金资助项目 (NWNU-LKQN-10-22)。

Bidirectional Proxy Re-signature Scheme with Strong Unforgeability

FENG Jie 1,LAN Caihui 1,2,JIA Borong 1,YANG Xiaodong 2   

  1. (1. School of Imformation Engineering,Lanzhou City University,Lanzhou 730070,China; 2. College of Computer Science & Engineering,Northwest Normal University,Lanzhou 730070,China)
  • Received:2014-05-13 Online:2015-03-15 Published:2015-03-13

摘要: 在代理重签名中,一个拥有重签名密钥的半可信代理者可以把受托者的签名转换为委托者对同一消息的签名(即重签名),但该代理者不能单独生成受托者或委托者的签名。标准模型下的代理重签名方案多数是存在不可伪造性的,无法阻止敌手对已经签名过的消息重新伪造一个合法的签名。为此,利用基于密钥的目标抗碰撞杂凑函数,提出一种新的双向代理重签名方案。在计算Diffie-Hellman 困难问题的假设下,证明该方案在适应性选择消息攻击下是强不可伪造的。分析结果表明,与已有强不可伪造的双向代理重签名方案相比,该方案的系统参数和重签名的长度短,且重签名的计算量小。

关键词: 双向代理重签名, 强不可伪造性, 存在不可伪造性, 标准模型, 系统参数, 目标抗碰撞杂凑函数

Abstract: In a proxy re-signature scheme,a semi-trusted proxy is allowed to transform a signature from a delegatee into a signature from a delegator on the same message using the re-signature key. But the proxy cannot generate signatures for either the delegatee or the delegator. Proxy re-signature schemes in the standard model are existentially unforgeable,which cannot prevent forgeries from forging valid signatures on new messages not previously re-signed. Based on target collision-resistant hash function, a bidirectional proxy re-signature scheme is proposed. Under computational Diffie-Hellman assumption,the proposed proxy re-signature scheme is provably secure against strong forgery under adaptive chosen message attacks. Moreover,the new scheme has some advantages over the available schemes,such as short system parameters,short re-signature and low re-signature computation cost.

Key words: bidirectional proxy re-signature, strong unforgeability, existential unforgeability, standard model, system parameter, Target Collision Resistant(TCR)hash function

中图分类号: