作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2012, Vol. 38 ›› Issue (13): 119-121. doi: 10.3969/j.issn.1000-3428.2012.13.035

• 安全技术 • 上一篇    下一篇

标准模型下的高效无证书短签名方案

魏春艳,蔡晓秋   

  1. (洛阳师范学院数学科学学院,河南 洛阳 471022)
  • 收稿日期:2011-10-27 出版日期:2012-07-05 发布日期:2012-07-05
  • 作者简介:魏春艳(1982-),女,讲师、硕士,主研方向:密码学,信息安全;蔡晓秋,讲师、硕士
  • 基金资助:
    河南省自然科学基金资助项目(112300410192);河南省教育厅科学技术研究基金资助重点项目(12B120009, 2011A120006)

Efficient Certificateless Short Signature Scheme Under Standard Model

WEI Chun-yan, CAI Xiao-qiu   

  1. (College of Mathematics and Science, Luoyang Normal University, Luoyang 471022, China)
  • Received:2011-10-27 Online:2012-07-05 Published:2012-07-05

摘要: 大多数无证书签名方案需要多个双线性对运算,导致效率较低。为此,基于强Diffie-Hellman问题,提出一种新的无证书短签名方案,在签名的生成和验证过程中只需要1次双线性对运算和1次哈希函数操作,且签名长度与Boneh-Boyen的短签名长度相同。在标准模型下证明该方案对于2类敌手的攻击均具有不可伪造性。

关键词: 无证书密码学, 标准模型, 随机预言, 强Diffie-Hellman问题, 双线性对, 不可伪造性

Abstract: Most certificateless signature schemes are inefficient because they need several bilinear parings operations. Aiming at the problem, this paper proposes a new certificateless short signature scheme based on Strong Diffie-Hellman(SDH) problem. It is more efficient because it needs only one bilinear parings operation and one hash operation in signing and verifying processes, and it has the same length as Boneh-Boyen’s short signature. It is proved satisfying non-forgeability under two types of adversaries’ attacks under standard model.

Key words: certificateless cryptography, standard model, random oracle, Strong Diffie-Hellman(SDH) problem, bilinear parings, non-forgeability

中图分类号: