浏览全部资源
扫码关注微信
1. 西北工业大学计算机学院,陕西 西安 710072
2. 西安电子科技大学综合业务网国家重点实验室,陕西 西安 710071
[ "李慧贤(1977-),女,内蒙古乌兰浩特人,博士,西北工业大学副教授,主要研究方向为网络与信息安全、安全协议设计与分析等。" ]
[ "邵璐(1991-),女,陕西咸阳人,西北工业大学硕士生,主要研究方向为安全协议设计与分析。" ]
[ "庞辽军(1978-),男,陕西渭南人,博士,西安电子科技大学教授,主要研究方向为密码学、信息安全等。" ]
网络出版日期:2017-02,
纸质出版日期:2017-02-25
移动端阅览
李慧贤, 邵璐, 庞辽军. 基于多项式同构的代理重签名方案[J]. 通信学报, 2017,38(2):16-24.
Hui-xian LI, Lu SHAO, Liao-jun PANG. Proxy re-signature scheme based on isomorphisms of polynomial[J]. Journal on communications, 2017, 38(2): 16-24.
李慧贤, 邵璐, 庞辽军. 基于多项式同构的代理重签名方案[J]. 通信学报, 2017,38(2):16-24. DOI: 10.11959/j.issn.1000-436x.2017024.
Hui-xian LI, Lu SHAO, Liao-jun PANG. Proxy re-signature scheme based on isomorphisms of polynomial[J]. Journal on communications, 2017, 38(2): 16-24. DOI: 10.11959/j.issn.1000-436x.2017024.
由于目前的代理重签名方案几乎都是基于大数分解、离散对数和椭圆曲线等问题设计的,无法抵抗量子攻击,提出了一个新的代理重签名方案。该方案通过借助多项式同构和秘密仿射变换技术,能够高效地完成代理重签名功能并且可以抵抗量子攻击。通过分析表明,该方案不但满足正确性与一致性,并且在随机预言机模型下具有不可伪造性。与现有的代理重签名方案相比,该方案不仅继承了多变量公钥密码体制的高效性与抗量子攻击性,还具有复用性、透明性和秘密代理性等特点。
Most of the existing proxy resignature schemes were based on the hardness of big integer factoring
discrete logarithm
elliptic curve.However
none of them can resist the attack by a quantum computer.Motivated by these concerns
a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials
the proposed scheme could implement the signature transformation with high-efficiency
and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent
and had the unforgeability in the random oracle model.Compared with the existing schemes
the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems
but also has the properties of multi-use
transparent and private proxy.
BOLDYREVA A , PALACIO A , WARINSCHI B . Secure proxy signature schemes for delegation of signing rights [J ] . Journal of Cryptology , 2012 , 25 ( 1 ): 57 - 115 .
CHEN X , LENZINI G , MAUW S , et al . A group signature based electronic toll pricing system [C ] // International Conference on Availability,IEEE Computer Society . 2011 : 85 - 93 .
SEVERENS M , FARQUHAR J , DUYSENS J , et al . A multi-signature brain-computer interface:use of transient and steady-state responses [J ] . Journal of Neural Engineering , 2013 , 10 ( 10 ): 1160 - 1166 .
BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography [J ] . Lecture Notes in Computer Science , 1998 , 1403 : 127 - 144 .
ATENIESE G , HOHENBERGER S . Proxy re-signatures:new definitions,algorithms,and applications [C ] // ACM Conference on Computer and Communications Security . 2005 : 310 - 319 .
SHAO J , CAO Z , WANG L C , et al . Proxy re-signature schemes without random oracles [C ] // Progress in Cryptology-Indocrypt 2007,International Conference on Cryptology in India . 2007 : 197 - 209 .
WATERS B , . Efficient identity-based encryption without random oracles [M ] // Advances in Cryptology-EUROCRYPT 2005 . Springer Berlin Heidelberg , 2005 : 114 - 127 .
LIBERT B , VERGNAUD D . Multi-use unidirectional proxy resignatures [C ] // ACM Conference on Computer and Communications Security.ACM . 2008 : 511 - 520 .
YANG P , CAO Z , DONG X . Threshold proxy re-signature [J ] . Journal of Systems Science &Complexity , 2008 , 24 ( 4 ): 816 - 824 .
SHAMIR A . How to share a secret [J ] . Communications of the ACM , 1979 , 22 ( 11 ): 612 - 613 .
YANG X D , ZHANG L , WANG C F . A flexible threshold proxy re-signature scheme with provable security [J ] . Computer Engineering&Science , 2014 .
FENG J , LAN C H , JIA B R . ID-based proxy resignature scheme with strong unforgeability [J ] . Journal of Computer Applications , 2014 .
ZHANG Y L , YANG X D , WANG C F . ID-based bidirectional threshold proxy re-signature [J ] . Journal of Computer Applications , 2011 , 31 ( 1 ): 4920 - 4926 .
SHOR P W . Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer [J ] . Siam Review , 1997 , 41 ( 2 ): 1484 - 1509 .
JACQUES P , . Hidden fields equations (HFE) and isomorphisms of polynomials (IP):two new families of asymmetric algorithms [M ] // Advances in Cryptology–EUROCRY- PT'96 . Springer Berlin Heidelberg , 1996 : 33 - 48 .
TANG S , XU L . Proxy signature scheme based on isomorphisms of polynomials [C ] // Network and System Security(NSS) 2012 . 2012 : 113 - 125 .
刘文浩 , 许春香 . 无证书两方密钥协商方案 [J ] . 软件学报 , 2011 , 22 ( 11 ): 2843 - 2852 .
LIU W H , XU C X . Two party certificateless key agreement schemes [J ] . Journal of Software , 2011 , 22 ( 11 ): 2843 - 2852 .
0
浏览量
260
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构