计算机工程与应用 ›› 2011, Vol. 47 ›› Issue (26): 83-85.

• 网络、通信、安全 • 上一篇    下一篇

一种基于身份的无可信中心的代理签名方案

米军利1,李苏北1,张建中2   

  1. 1.徐州工程学院 数学与物理科学学院,江苏 徐州 221008
    2.陕西师范大学 数学与信息科学学院,西安 710062
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2011-09-11 发布日期:2011-09-11

ID-based proxy signature scheme without trusted center

MI Junli1,LI Subei1,ZHANG Jianzhong2   

  1. 1.School of Mathematics and Physical Science of Xuzhou Institute of Technology,Xuzhou,Jiangsu 221008,China
    2.College of Mathematics and Information Science of Shaanxi Normal University,Xi’an 710062,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2011-09-11 Published:2011-09-11

摘要: 在已有的基于身份无可信中心签名的基础上,结合基于身份的代理签名提出了一个基于身份无可信中心的代理签名。提出的签名方案不仅满足代理签名方案的基本安全要求,而且保证了代理签名人只能对所指定的签名接收人产生代表原始签名人的有效代理签名,从而防止了代理签名权利的滥用。与已有的方案相比,该方案中协议与算法简洁、高效,在安全强度不变的条件下,降低了软硬件实现的系统开销,可广泛应用于电子商务等网络业务环境。

关键词: 代理签名, 椭圆曲线加密, 配对双线性, 伪造攻击

Abstract: Based proxy signature,a new ID-based proxy signature without trusted PKC is proposed.Analysis of the security of the proposed scheme shows that it satisfies the basic security requirements of proxy signature,and the valid proxy signature generated by the proxy signer on behalf of the original signer can only be verified and thus accepted by the receiver nominated by the original signer.In the communication protocols,the processes of signature,authentication,encryption and decryption are simultaneously completed in a single protocol process and the conventional crypto graphical protocols in data transferring are greatly simplifiedwithout in fluencing the security of system.Further detailed analyses also justify the brevity of scheme,security,high efficiency,and considerable reduction in systemoverheads regarding software and hardware application.

Key words: proxy signature, Elliptic Curve Cryptography(ECC), bilinear pairings, forgery attack