浏览全部资源
扫码关注微信
1. 西北师范大学计算机科学与工程学院,甘肃 兰州 730070
2. 密码科学技术国家重点实验室,北京 100878
[ "杨小东(1981-),男,甘肃甘谷人,西北师范大学副教授,主要研究方向为密码学及云计算安全。" ]
[ "陈春霖(1995-),女,甘肃兰州人,西北师范大学硕士生,主要研究方向为大数据安全。" ]
[ "杨平(1993-),男,甘肃灵台人,西北师范大学硕士生,主要研究方向为网络与信息安全。" ]
[ "安发英(1991-),男,青海民和人,西北师范大学硕士生,主要研究方向为物联网安全。" ]
[ "麻婷春(1992-),女,甘肃武威人,西北师范大学硕士生,主要研究方向为云计算安全。" ]
[ "王彩芬(1963-),女,河北安国人,博士,西北师范大学教授、博士生导师,主要研究方向为密码学、网络安全、信息安全。" ]
网络出版日期:2018-02,
纸质出版日期:2018-02-25
移动端阅览
杨小东, 陈春霖, 杨平, 等. 可证安全的部分盲代理重签名方案[J]. 通信学报, 2018,39(2):65-72.
Xiaodong YANG, Chunlin CHEN, Ping YANG, et al. Partially blind proxy re-signature scheme with proven security[J]. Journal on communications, 2018, 39(2): 65-72.
杨小东, 陈春霖, 杨平, 等. 可证安全的部分盲代理重签名方案[J]. 通信学报, 2018,39(2):65-72. DOI: 10.11959/j.issn.1000-436x.2018014.
Xiaodong YANG, Chunlin CHEN, Ping YANG, et al. Partially blind proxy re-signature scheme with proven security[J]. Journal on communications, 2018, 39(2): 65-72. DOI: 10.11959/j.issn.1000-436x.2018014.
针对盲代理重签名的匿名性和可控性问题,借鉴部分盲签名的设计思想,引入部分盲代理重签名的概念,并给出了部分盲代理重签名的安全性定义。基于改进的 Shao 方案,构造一种标准模型下的双向盲代理重签名方案,允许在最终的重签名中添加受托者和代理者协商的公共信息,不仅实现了签名从受托者到代理者之间的透明转换,保护重签名消息的隐私,还能防止受托者对重签名的非法使用。分析结果表明,新方案满足正确性、多用性、部分盲性和不可伪造性,其性能更适用于电子政务数据交换、跨域身份认证等系统。
In order to solve the problem of anonymity and controllability of blind proxy re-signature
the concept of partially blind proxy re-signature was introduced by using the idea of partially blind signature.Furthermore
the security definition of partially blind proxy re-signature was also given.Based on the improved Shao scheme
a partially blind proxy re-signature scheme in the standard model was proposed.The proposed scheme allows proxy to add some public information negotiated by delegatee and proxy to re-signature.The scheme not only can achieve the transparent signature conversion from delegatee to proxy and protect privacy of message re-signed by proxy
but also prevented illegal use of re-signature.Analysis results show that the proposed scheme is correct
multi-use
partially blind and existentially unforgeable.It is more suitable for e-government data exchange system
cross-domain authentication system and so on.
BLAZE M , BLEUMER G , STRUSS M . Divertible protocols and atomic proxy cryptography [C ] // EUROCRYPT’98 . 1998 : 127 - 144 .
HU X , LIU Y , XU H , et al . Analysis and improvement of certificateless signature and proxy re-signature schemes [C ] // 2015 IEEE Advanced Information Technology,Electronic and Automation Control Conference . 2015 : 166 - 170 .
JIANG M M , HU Y P , WANG B C , et al . Lattice-based multi-use unidirectional proxy re-encryption [J ] . Security and Communication Networks , 2015 , 8 ( 18 ): 3796 - 3803 .
ATENIESE G , HOHENBERGER S . Proxy re-signatures:new definitions,algorithms,and applications [C ] // The 12th ACM CCS . 2005 : 310 - 319 .
CANETTI R , GOLDREICHO O , HALEVI S . The random oracle methodology,revisited [J ] . Journal of the ACM , 2004 , 51 ( 4 ): 557 - 594 .
SHAO J , CCAO Z , WANG L , et al . Proxy re-signature schemes without random oracles [C ] // INDO-CRYPT 2007 . 2007 : 197 - 209 .
KIM K , YIE I , LIM S . Remark on shao et al's bidirectional proxy re-signature scheme in indocrypt'07 [J ] . International Journal of Network Security , 2009 , 8 ( 3 ): 308 - 311 .
TIAN M . Identity-based proxy re-signatures from lattices [J ] . Information Processing Letters , 2015 , 115 ( 4 ): 462 - 467 .
CHEN L , CHEN X , SUN Y , et al . A new certificateless proxy re-signature scheme in the standard model [C ] // IEEE Computational Intelligence and Design . 2014 : 202 - 206 .
YANG X , GAO G , WANG C . On-line/off-line threshold proxy re-signature scheme through the simulation approach [J ] . Applied Mathematics & Information Sciences , 2015 , 9 ( 6 ): 3251 - 3261 .
TIAN M M . Identity-based proxy re-signatures from lattices [J ] . Information Processing Letters , 2015 , 115 ( 4 ): 462 - 467 .
YANG X D , LI C M , LI Y , et al . Divisible on-line/off-line proxy re-signature [J ] . Applied Mathematics & Information Sciences , 2015 , 9 ( 2 ): 759 - 767 .
邓宇乔 , 杜明辉 , 尤再来 , 等 . 一种基于标准模型的盲代理重签名方案 [J ] . 电子与信息学报 , 2010 , 32 ( 5 ): 1219 - 1223 .
DENG Y Q , DU M H , YOU Z L , et al . A blind proxy re-signatures scheme based on standard model [J ] . Journal of Electronics & Information Technology , 2010 , 32 ( 5 ): 1219 - 1223 .
冯涛 , 梁一鑫 . 可证安全的无证书盲代理重签名 [J ] . 通信学报 , 2012 , 31 ( S1 ): 58 - 69 .
FENG T , LIANG Y X . Provably secure certificate less blind proxy re-signatures [J ] . Journal on Communications , 2012 , 31 ( S1 ): 58 - 69 .
胡小明 , 杨寅春 , 刘琰 . 一种基于标准模型的盲代理重签名方案的安全性分析和改进 [J ] . 小型微型计算机系统 , 2011 , 32 ( 10 ): 2008 - 2011 .
HU X M , YANG Y C , LIU Y . Analysis and improvement of a blind proxy re-signature scheme based on standard model [J ] . Journal of Chinese Computer Systems , 2011 , 32 ( 10 ): 2008 - 2011 .
张延红 , 陈明 . 标准模型下增强的基于身份部分盲签名 [J ] . 四川大学学报:工程科学版 , 2014 , 46 ( 1 ): 95 - 101 .
ZHANG Y H , CHEN M . Extended identity-based partially blind signature scheme in the standard model [J ] . Journal of Sichuan University(Engineering Science Edition) , 2014 , 46 ( 1 ): 95 - 101 .
TAHAT N , ADBALLAH E E . A proxy partially blind signature approach using elliptic curve cryptosystem [J ] . International Journal of Mathematics in Operational Research , 2016 , 8 ( 1 ): 87 - 95 .
0
浏览量
836
下载量
3
CSCD
关联资源
相关文章
相关作者
相关机构