计算机工程

• 安全技术 • 上一篇    下一篇

基于身份的服务器辅助验证代理重签名方案

杨小东,李亚楠,周其旭,高国娟,王彩芬   

  1. (西北师范大学 计算机科学与工程学院,兰州 730070)
  • 收稿日期:2016-07-12 出版日期:2017-04-15 发布日期:2017-04-14
  • 作者简介:杨小东(1981—),男,副教授、博士,主研方向为密码学、云计算安全;李亚楠、周其旭、高国娟,硕士研究生;王彩芬,教授、博士生导师。
  • 基金项目:
    国家自然科学基金(61262057,61662069);甘肃省科技计划项目(145RJDA325);国家档案局科技计划项目(2014-X-33);甘肃省高等学校科研计划项目(2014-A011);兰州市科技计划项目(2013-4-22);西北师范大学青年教师科研能力提升计划项目(NWNU-LKQN-13-23,NWNU-LKQN- 14-7)。

ID-based Sever-aided Verification Proxy Re-signature Scheme

YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen   

  1. (College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China)
  • Received:2016-07-12 Online:2017-04-15 Published:2017-04-14

摘要: 在现有的多数基于身份代理重签名方案中,签名验证过程包含有复杂的双线性对运算,由于执行耗时较长,使其在计算能力较弱的低端计算设备上适用性较低。为提高签名验证效率,结合服务器辅助验证签名和基于身份的代理重签名,引入基于身份的服务器辅助验证代理重签名体制,并给出其安全性定义。设计一个新的服务器辅助验证代理重签名方案,在合谋攻击、自适应选择身份和消息攻击下证明方案的安全性。分析结果表明,该方案将签名验证的大部分计算任务委托给服务器执行,有效减少了双线性对的计算量,降低了签名验证算法的计算复杂度。

关键词: 服务器辅助验证代理重签名, 双线性对, 多线性映射, 合谋攻击, 计算复杂度

Abstract: Signature verification in the existing ID-based proxy re-signature schemes includes time-consuming bilinear pairing operations,which are not suitable for low-power devices.In order to improve the efficiency of signature verification,combined with server-aided verification signature and ID-based proxy re-signature,the concept of ID-based sever-aided verification proxy re-signature is introduced and its security definition is presented.An ID-based sever-aided verification proxy re-signature scheme is designed,which is proven to be secure under collusion attack,adaptive chosen identity and message attacks.Analysis results show that most computing tasks of signature verification in the proposed scheme can be accomplished by a server,and the computation of bilinear pairing is effectively reduced.Hence,this scheme greatly reduces the computational complexity of the signature verification algorithm,and is more efficient than the existing ID-based proxy re-signature schemes.

Key words: sever-aided verification proxy re-signature, bilinear pairing, multi-linear mapping, collusion attack, computational complexity

中图分类号: