標準模型下的服務(wù)器輔助驗證代理重簽名方案
doi: 10.11999/JEIT150966
國家自然科學(xué)基金(61262057, 61063041),甘肅省科技計劃(145RJDA325, 1308RJYA039),國家檔案局科技項目(2014-X-33),蘭州市科技計劃項目(2013-4-22,2014-1-256),甘肅省高等學(xué)??蒲许椖?2015A-011),西北師范大學(xué)青年教師科研能力提升計劃(NWNU-LKQN-13-23)
Sever-aided Verification Proxy Re-signature Scheme in the Standard Model
The National Natural Science Foundation of China (61262057, 61063041), Science and Technology Project of Gansu Province of China (145RJDA325, 1308RJYA039), Science and Technology Foundation of National Archives of China (2014-X-33), Science and Technology Project of Lanzhou (2013-4-22, 2014-1-256), Gansu Province Higher Educational Science and Technology Program (2015A-011), Youth Foundation of Northwest Normal University (NWNU-LKQN-13-23)
-
摘要: 代理重簽名具有轉(zhuǎn)換簽名的功能,在云存儲、數(shù)據(jù)交換、跨域身份認證等領(lǐng)域有廣泛的應(yīng)用前景。目前大多數(shù)代理重簽名方案需要復(fù)雜的雙線性對運算,無法適用于計算能力較弱的低端計算設(shè)備。為了提高代理重簽名的簽名驗證效率,該文給出了雙向服務(wù)器輔助驗證代理重簽名的安全性定義,并提出一個高效的服務(wù)器輔助驗證代理重簽名方案,在標準模型下證明新方案在合謀攻擊和選擇消息攻擊下是安全的。分析結(jié)果表明,新方案有效減少了雙線性對的計算量,大大降低了簽名驗證算法的計算復(fù)雜度,在效率上優(yōu)于已有的代理重簽名方案。
-
關(guān)鍵詞:
- 密碼學(xué) /
- 服務(wù)器輔助驗證代理重簽名 /
- 合謀攻擊 /
- 不可偽造性 /
- 標準模型
Abstract: Proxy re-signature has the function of converting signature, and has extensive application prospects, such as cloud storage, data exchange, cross-domain identity authentication and so on. However, most proxy re-signature schemes require expensive bilinear pairing operations, which are not suitable for low-power devices. To improve the performance of proxy re-signature schemes, the security model of a bidirectional sever-aided verification proxy re-signature is presented. Furthermore, a sever-aided verification proxy re-signature scheme is proposed. This scheme is proven to be secure under collusion attacks and adaptive chosen message attacks in the standard model. Analysis results show that the proposed scheme effectively reduces the computation cost of pairing operation, and it greatly reduces computational complexity of signature verification algorithm. The proposed scheme is more efficient than the existing proxy re-signature schemes. -
BLAZE M, BLEUMER G, and STRAUSS M. Divertible protocols and atomic proxy cryptography[C]. Proceedings of EUROCRYPT98, Helsinki, Finland, 1998: 127-144. doi: 10.1.1.81.8246. HAO S G, ZHANG L, and MUHAMMAD G. A union authentication protocol of cross-domain based on bilinear pairing[J]. Journal of Software, 2013, 8(5): 1094-1100. doi: 10.4304/jsw.8.5.1094-1100. NGUYEN T C, SHEN W, LUO Z, et al. Novel Data Integrity Verification Schemes in Cloud Storage[M]. Switzerland: Springer International Publishing, 2015: 115-125. doi: 10.1007/BFb0054122. 孫奕, 陳性元, 杜學(xué)繪, 等. 一種用于流交換的代理重簽名方案[J]. 軟件學(xué)報, 2015, 26(1): 129-144. doi: 10.13328/j.cnki. jos.004553. SUN Yi, CHEN X Y, DU X H, et al. Proxy re-signature scheme for stream exchange[J]. Journal of Software, 2015, 26(1): 129-144. doi: 10.13328/j.cnki.jos.004553. ATENIESE G and HOHENBERGER S. Proxy re-signatures: new definitions, algorithms, and applications[C]. Proceedings of the 12th ACM CCS, Alexandria, USA, 2005: 310-319. doi: 10.1145/1102120.1102161. SHAO J, CAO Z, WANG L, et al. Proxy re-signature schemes without random oracles[C]. Proceedings of INDO-CRYPT 2007, Chennai, India, 2007: 197-209. doi: 10.1007/ 978-3-540-77026-8_15. WATERS B. Efficient identity-based encryption without random oracles[C]. Proceedings of EuroCrypt 2005, Aarhus, 2005: 114-127. doi: 10.1007/11426639_7. KiIATE K, IKKWON Y, and SECOGAN L. Remark on shao et als bidirectional proxy re-signature scheme in indocrypt07[J]. International Journal of Network Security, 2009, 8(3): 308-311. doi: 10.4304/jcp.7.7.1796-1800. LIBERT B and VERGNAUD D. Multi-use unidirectional proxy re-signatures[C]. Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, USA, 2008: 511-520. doi: 10.1145/1455770. 1455835. WANG W P. An identity-based blind proxy re-signature scheme[J]. Computer Applications and Software, 2012, 29(10): 308-313. doi: 10.3969/j.issn.1000. YANG X, LI C, LI Y, et al. Divisible on-line/off-line proxy re-signature[J]. Applied Mathematics Information Sciences, 2015, 9(2): 759-767. doi: 10.1007/978-3-642-00862-7_10. YANG X, WANG C, ZHANG L, et al. On-line/off-line threshold proxy re-signatures[J]. Chinese Journal of Electronics, 2014, 23(2): 248-253. doi: 10.4156/jcit.vol7. issue23.7. TIAN M M. Identity-based proxy re-signatures from lattices [J]. Information Processing Letters, 2015, 115(4): 462-467. doi: 10.1016/j.ipl.2014.12.002. 江明明, 胡予濮, 王保倉, 等. 格上基于身份的單向代理重簽名[J]. 電子與信息學(xué)報, 2014, 36(3): 645-649. doi: 10.3724/ SP.J.1146.2013. 00818. JIANG M M, HU Y P, WANG B C, et al. Identity-based unidirectional proxy re-signature over lattice[J]. Journal of Electronics Information Technology, 2014, 36(3): 645-649. doi: 10.3724/SP.J.1146.2013. 00818. 龍昭華, 龔俊, 王波, 等. 無線傳感器網(wǎng)絡(luò)中分簇安全路由協(xié)議保密通信方法的能效研究[J]. 電子與信息學(xué)報, 2015, 37(8): 2000-2006. doi: 10.11999/JEIT141284. LONG Z H, GONG J, WANG B, et al. Energy efficiency study of secret communication method on clustering[J]. Journal of Electronics Information Technology, 2015, 37(8): 2000-2006. doi: 10.11999/JEIT141284. WANG Z and W. Server-aided verification proxy re-signature[C]. Proceedings of Trust, Security and Privacy in Computing and Communications, Melbourne, Australia, 2013: 1704-1707. doi: 10.1109/TrustCom.2013.211. CANETTI R, GOLDREICH O, and HALEVI S. The random oracle methodology, revisited[J]. Journal of the ACM, 2004, 51(4): 557-594. doi: 10.1145/1008731.1008734. WU W, MU Y, SUSILO W, et al. Server-aided verification signatures: definitions and new constructions[C]. Proceedings of Provable Security, Shanghai, China, 2008: 141-155. doi: 10.1007/978-3-540-88733-1_10. WANG Zh W, WANG L Ch , YANG Y X, et al. Comment on Wu et al.s server-aided verification signature schemes[J]. International Journal of Network Security, 2010, 10(2): 158-160. doi: 10.1.1.592.231. -
計量
- 文章訪問數(shù): 1455
- HTML全文瀏覽量: 209
- PDF下載量: 367
- 被引次數(shù): 0