Computer Engineering and Applications ›› 2009, Vol. 45 ›› Issue (9): 117-119.DOI: 10.3778/j.issn.1002-8331.2009.09.034

• 网络、通信、安全 • Previous Articles     Next Articles

ID-based threshold proxy signature Scheme

TIAN Zhi-gang,BAO Wan-su   

  1. Institute of Electronic Technology,Information Engineering University of PLA,Zhengzhou 450004,China
  • Received:2008-01-28 Revised:2008-04-07 Online:2009-03-21 Published:2009-03-21
  • Contact: TIAN Zhi-gang

基于身份的门限代理签名方案

田志刚,鲍皖苏   

  1. 解放军信息工程大学 电子技术学院,郑州 450004
  • 通讯作者: 田志刚

Abstract: In the ID-based crypto system,user’ public key is decided by his ID which is not distributed by CA.This way has solved the problem of public key’s storage and management.In a threshold proxy signature,the power of signature is distributed to a signature group which can prevent the abuse of the power.This article introduces an ID-based threshold signature scheme which uses bilinear parings.In addition,an analysis is given about the relevant security of this scheme.And this scheme can also withstand the conspiracy attack.

摘要: 在基于身份的密码体制中,用户的公钥由用户的身份信息决定,不需要CA颁发公钥证书,解决了公钥存储和管理问题。门限代理签名因其可以将签名权利分散于一个签名团体,可以有效防止代理签名权的滥用而受到广泛关注。基于双线性映射对构造了一个基于身份的门限代理签名方案,分析了方案的可区分性、可验证性、强不可伪造性、强可识别性、强不可否认性等安全特性,并指出该方案可以很好地抵抗合谋攻击。