信息网络安全 ›› 2018, Vol. 18 ›› Issue (7): 47-54.doi: 10.3969/j.issn.1671-1122.2018.07.006

• • 上一篇    下一篇

一种具有双向安全性的基于身份的短签名方案

左黎明1,2,3, 胡凯雨1,2(), 张梦丽1,2, 夏萍萍1,2   

  1. 1. 华东交通大学理学院,江西南昌 330013
    2. 华东交通大学系统工程与密码学研究所,江西南昌 330013
    3. 江西省经济犯罪侦查与防控技术协同创新中心,江西南昌 330103
  • 收稿日期:2018-01-30 出版日期:2018-07-15 发布日期:2020-05-11
  • 作者简介:

    作者简介:左黎明(1981—),男,江西,副教授,硕士,主要研究方向为信息安全;胡凯雨(1995—),男,江西,硕士研究生,主要研究方向为信息安全;张梦丽(1992—),女,安徽,硕士研究生,主要研究方向为信息安全;夏萍萍(1995—),女,江西,硕士研究生,主要研究方向为信息安全。

  • 基金资助:
    国家自然科学基金[11761033];江西省教育厅科技项目[GJJ161417,GJJ170386];江西省交通运输厅科技项目[2017D0037];江西省经济犯罪侦查与防控技术协同创新中心开放课题 [JXJZXTCX-001]

A Short Identity-based Signature Scheme with Bilateral Security

Liming ZUO1,2,3, Kaiyu HU1,2(), Mengli ZHANG1,2, Pingping XIA1,2   

  1. 1. School of Science, East China Jiaotong University, Nanchang Jiangxi 330013, China
    2. Institute of Systems Engineering and Cryptograph, East China Jiaotong University, Nanchang Jiangxi 330013, China
    3. Collaborative Innovation Center for Economics Crime Investigation and Prevention Technology, Nanchang Jiangxi 330103, China
  • Received:2018-01-30 Online:2018-07-15 Published:2020-05-11

摘要:

具有前向安全性和基于身份的短签名是数字签名的重要研究方向,在物联网工控协议中具有重要应用。文章在BONEH方案的基础上,从前向安全定义的根本思想出发,构造了一种具有双向安全性的基于身份的短签名方案,方案不仅具有基于身份的短签名的安全性质,还具有前向安全性和后向安全性,有效解决了基于身份的签名方案的私钥泄露问题。文章在k-CAA困难问题和随机预言机模型下,证明了签名方案在适应性选择消息和身份攻击下是存在性不可伪造的。文章最后与几种经典方案进行了效率分析比较,并用C语言实现了方案,实验结果表明,文中方案签名和验证的计算复杂度较低,签名长度较短。

关键词: 前向安全性, 后向安全性, 基于身份的签名, 短签名, 随机预言机模型

Abstract:

Short identity-based signature with forward-secure is an important research direction of digital signature, which has important applications in industrial control protocol of IOT (Internet of things). Based on the BONEH’s scheme, starting from the basic idea of forward security definition, a scheme with bilateral security and short identity-based signature was structured, and scheme not only has the security property of identity-based signature, but also satisfies forward security and backward security, which effectively solves the problem of private key leakage in identity-based signature schemes. Subsequently, the scheme was proved to be existentially unforgeable under the adaptive chosen message and identity-based attacks in random oracle model with k-traitors (k-CAA) problem. Finally, the scheme was compared with several classical schemes about the efficiency analysis and was successfully implemented with C in the same environment. The results show that the computational complexity of the signature and verification is lower and the length of the signature is shorter.

Key words: forward security, backward security, identity-based signature, short signature, random oracle model

中图分类号: