基于双线性对的Chameleon签名方案
作者:
基金项目:

Supported by the Communication Security Foundation of China under Grant Nos.J641,0130(国家通信保密基金);the National Natural Science Foundation of China under Grant No.69931010(国家自然科学基金)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [10]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    Chameleon签名方案是一种利用Hash-and-Sign模式的非交互签名方案,并且具有不可转移性,只有指定的接收者才可以确信签名的有效性.利用双线性对提出了一种新的Chameleon Hash函数,并在此基础上构建了相应的基于身份的Chameleon签名方案.与传统的Chameleon Hash函数相比,该方案中的Hash函数公钥所有者无须获取相应私钥,除非它企图伪造签名.该方案不但具有通常Chameleon签名方案的所有特点,而且具有基于身份密码系统的诸多优点.

    Abstract:

    Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm,and similar in efficiency to regular signatures.The distinguishing characteristic of chameleon signatures is that they are non-transferable,with only the designated recipient capable of asserting its validity.This paper introduces a new chameleon hash function based on bilinear pairing and builds the ID-based chameleon signature scheme.Compared with the conventional chameleon hashing functions,the owner of a public hash key in the ID-based chameleon hashing scheme does not necessarily need to retrieve the associated secret key.The scheme enjoys all the attributes in the normal chameleon signature and the added characteristics of ID-based cryptography based on bilinear pairing.

    参考文献
    [1]Chaum D,Antwerpen H.Undeniable signatures.In:Brassard G.Advances in Cryptology-CRYPTO'89.Springer-Verlag,1991.212-216.
    [2]Boyar J,Chaum D,Damgard IB,Pedersen TP.Convertible undeniable signatures.In:Menezes A,Vanstone SA,eds.Advances in Cryptology-CRYPTO'90.Springer-Verlag,1990.189-205.
    [3]Chaum D.Zero-Knowledge undeniable signature.In:Damgard I,ed.Advances in Cryptology-EURPCRYPT'90.Aarhus:SpringerVerlag,1990.458-464.
    [4]Chaum D,van Heijst E,Pfitzmann B.Cryptographically strong undeniable signatures,unconditionally secure for the signer.In:Feigenbaum J,ed.Advances in Cryptology-CRYPTO'91.Springe-Verlag,1990.470-484.
    [5]Van Heijst E,Pedersen T.How to make efficient fail-stop.signatures.In:Rueppel RA,ed.Advances in Cryptology-EURPCRYPT'92.Balatonfured:Springer-Verlag,1993.366-377.
    [6]Krawczyk H,Rabin T.Chameleon signature.In:Proc.of the Network and Distributed System Security Symp.(NDSS 2000).The Internet Society,2000.143-154.
    [7]Boneh D,Franklin M.Identity-Based encryption from the Weil pairing.In:Kilian J,ed.Advances in Cryptology-CRYPTO 2001.Springer-Verlagt,2001.213-229.
    [8]Boneh D,Lynn B,Shacham H.Short signatures from the Weil pairing.In:Boyd C,ed.Advances in Cryptology-ASIACRYPT 2001.Gold Coast:Springer-Verlag,2001.514-532.
    [9]Gentry C,Silverberg A.Hierarchical ID-based cryptography.In:Zheng YL,ed.Advances in Cryptology-ASIACRYPT 2002.Queenstown:Springer-Verlag,2002.213-229.
    [10]Horwitz J,Lynn B.Toward hierarchical identity-based encryption.In:Knudsen LR,ed.Advances in Cryptology-EURPCRYPT 2002.Amsterdam:Springer-Verlag,2002.466-481.
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

杜欣军,王莹,葛建华,王育民.基于双线性对的Chameleon签名方案.软件学报,2007,18(10):2662-2668

复制
分享
文章指标
  • 点击次数:4242
  • 下载次数: 5110
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2003-10-13
  • 最后修改日期:2006-04-27
文章二维码
您是第19867155位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号