信息网络安全 ›› 2018, Vol. 18 ›› Issue (7): 47-54.doi: 10.3969/j.issn.1671-1122.2018.07.006
左黎明1,2,3, 胡凯雨1,2(), 张梦丽1,2, 夏萍萍1,2
收稿日期:
2018-01-30
出版日期:
2018-07-15
发布日期:
2020-05-11
作者简介:
作者简介:左黎明(1981—),男,江西,副教授,硕士,主要研究方向为信息安全;胡凯雨(1995—),男,江西,硕士研究生,主要研究方向为信息安全;张梦丽(1992—),女,安徽,硕士研究生,主要研究方向为信息安全;夏萍萍(1995—),女,江西,硕士研究生,主要研究方向为信息安全。
基金资助:
Liming ZUO1,2,3, Kaiyu HU1,2(), Mengli ZHANG1,2, Pingping XIA1,2
Received:
2018-01-30
Online:
2018-07-15
Published:
2020-05-11
摘要:
具有前向安全性和基于身份的短签名是数字签名的重要研究方向,在物联网工控协议中具有重要应用。文章在BONEH方案的基础上,从前向安全定义的根本思想出发,构造了一种具有双向安全性的基于身份的短签名方案,方案不仅具有基于身份的短签名的安全性质,还具有前向安全性和后向安全性,有效解决了基于身份的签名方案的私钥泄露问题。文章在k-CAA困难问题和随机预言机模型下,证明了签名方案在适应性选择消息和身份攻击下是存在性不可伪造的。文章最后与几种经典方案进行了效率分析比较,并用C语言实现了方案,实验结果表明,文中方案签名和验证的计算复杂度较低,签名长度较短。
中图分类号:
左黎明, 胡凯雨, 张梦丽, 夏萍萍. 一种具有双向安全性的基于身份的短签名方案[J]. 信息网络安全, 2018, 18(7): 47-54.
Liming ZUO, Kaiyu HU, Mengli ZHANG, Pingping XIA. A Short Identity-based Signature Scheme with Bilateral Security[J]. Netinfo Security, 2018, 18(7): 47-54.
[1] | MA Chunguang, YANG Yixian.Transferable Off-Line Electronic Cash[J]Chinese Journal of Computers, 2005, 28(3): 301-308. |
马春光,杨义先. 可转移离线电子现金[J]. 计算机学报,2005,28(3):301-308. | |
[2] | LI Yuechuan.Using Virtual Phone Implementation Fraud Crime of Case Analysis[J]. Netinfo Security, 2011, 11(5): 68-70. |
李粤川. 利用虚拟电话实施诈骗犯罪之案例分析[J]. 信息网络安全,2011,11(5):68-70. | |
[3] | ZHAO Xiang.Overview of Digital Signature[J]. Computer Engineering and Design, 2006, 27(2): 195-197. |
赵翔. 数字签名综述[J]. 计算机工程与设计,2006,27(2):195-197. | |
[4] | HAO Wenjiang, XU Liping, JIANG Jinlei, et al.Research on Control Technology of Telecom Network Fraud Crime[J]. Netinfo Security, 2016, 16(9): 213-217. |
郝文江,徐丽萍,姜劲蕾,等. 电信网络诈骗犯罪治理技术研究[J].信息网络安全,2016,16(9):213-217. | |
[5] | LIU D Y W, XUE G Z, XIE Y, et al. Chapter 12-Performance of Digital Signature Schemes on Mobile Devices[EB/OL]. , 2017-11-12. |
[6] | YUAN Chao, XU Mixue, SI Xueming.Research on a New Signature Scheme on Blockchain[J]. Security and Communication Networks, 2017(2): 1-10. |
[7] | YANG Shanjun, JIANG Changjin.A Contract Signing Protocol Based on the Convertible Undeniable Signature[J]. Netinfo Security, 2017, 17(4): 34-39. |
杨善军,姜昌金. 基于可转换的不可抵赖签名的合同签署协议[J]. 信息网络安全,2017,17(4):34-39. | |
[8] | ANDERSON R.Invited Lecture[C]//ACM. 4th ACM Conference on Computer and Communications Security, April 1-4, 1997, Zurich, Switzerland. New York: ACM, 1997: 1-7. |
[9] | BELLARE M, MINER S K.A Forward-secure Digital Signature Scheme[C]//Springer. 19th Annual International Cryptology Conference, August 15-19, 1999, Santa Barbara, CA, USA. Heidelberg: Springer, 1999: 431-448. |
[10] | ANDERSON R. Two Remarks on Public Key Cryptology[EB/OL]. , 2017-11-10. |
[11] | BURMESTER M, CHRISSIKOPOULOS V, KOTZANIKOLAOU P, et al.Strong Forward Security[C]//ACM. 16th Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge, June 11-13, Beijing, China. New York: ACM, 2001: 109-122. |
[12] | GUAN D J, LIN Dairui, WANG C I.A Forward-secure Signature with Backward-secure Detection[C]//IEEE. 2008 International Conference on Information Security and Assurance, April 24-26, 2008, Busan, South Korea. New Jersey: IEEE, 2008: 106-110. |
[13] | ZHOU Yousheng, XIN Yang, QING Sihan, et al.Forward-backward Secure Group Signature Scheme[J]. Journal of Beijing University of Technology, 2012, 38(5): 736-739. |
周由胜,辛阳,卿斯汉,等.双向安全的群签名方案[J]. 北京工业大学学报,2012,38(5):736-739. | |
[14] | ZHANG Xuejun, ZHANG Yue.ID-based Forward Secure Proxy Signature Scheme[J]. Computer Engineering and Applications, 2012, 48(19): 66-68,118. |
张学军,张岳. 基于身份前向安全的代理签名方案[J]. 计算机工程与应用,2012,48(19):66-68,118. | |
[15] | WEI Jianghong, LIU Wenfen, HU Xuexian.Forward-secure Threshold Attribute-based Signature Scheme[J]. The Computer Journal, 2015, 58(10): 2492-2506. |
[16] | SHAMIR A.Identity-based Cryptosystems and Signature Schemes[J]. Workshop on the Theory & Application of Cryptographic Techniques, 1984, 21(2): 47-53. |
[17] | JOUX A.A one Round Protocol for Tripartite Diffie-Hellman[C]//Springer. 4th International Symposium on Algorithmic Number Theory, July 2-7, 2000, Leiden, Netherlands. Heidelberg: Springer, 2000: 385-394. |
[18] | BONEH D, FRANKLIN M K.Identity-based Encryption from the Weil Pairing[C]//ACM. 21st Annual International Cryptology Conference on Advances in Cryptology, August 19-23, 2001, Santa Barbara, CA, USA. New York: ACM, 2001: 213-229. |
[19] | BONEH D, LYNN B, SHACHAM H.Short Signatures from the Weil Pairing[C]//Springer. 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, December 9-13, 2001, Gold Coast, Australia. Heidelberg: Springer, 2001: 514-532. |
[20] | ZHANG Leyou, HU Yupu, WU Qing. New Identity-based Short Signature Without Random Oracles[EB/OL]. , 2017-12-10. |
[21] | YANG Lu, YOU Lin, YANG Minghui.An Identity-based Short Signature Broadcast Authentication Protocol in WSNs[J]. Computer Engineering & Science, 2012, 34(2): 25-30. |
杨露,游林,杨明慧. WSN中一种基于身份的短签名广播认证协议[J]. 计算机工程与科学,2012,34(2):25-30. | |
[22] | ASAAR M R, SALMASIZADEH M, SUSILO W. A Short Identity-based Proxy Ring Signature Scheme from RSA[EB/OL]. , 2017-12-10. |
[23] | KARATI A, BISWAS G P.Efficient and Provably Secure Random Oracle-free Adaptive Identity-based Encryption with Short-signature Scheme[J]. Security and Communication Networks, 2016, 9(17): 4060-4074. |
[24] | MESHRAM C Y, POWAR P L, OBAIDAT M S. An UF-IBSS-CMA Protected Online/Offline Identity-based Short Signature Technique using PDL[EB/OL]. , 2017-12-10. |
[25] | LI Xiao, HE Mingxing.A Forward Security Digital Signature Scheme Based on RSA[J]. Computer Engineering and Applications, 2006, 42(16): 124-126. |
李虓,何明星. 基于RSA的前向安全的数字签名[J]. 计算机工程与应用,2006,42(16):124-126. | |
[26] | MISTSUNARI S, SAKAI R, KASAHARA M.A New Traitor Tracing[J]. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2002, 85(2): 481-484. |
[27] | CHA J C, CHEON J H.An Identity-based Signature from Gap Diffie-Hellman Groups[C]//Springer. 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography, January 6-8, 2003, Miami, FL, USA. Heidelberg: Springer, 2003: 18-30. |
[28] | HESS F.Efficient Based Signature Schemes Based on Pairings[C]//Springer. 9th Annual International Workshop on Selected Areas in Cryptography, August 15-16, 2002, Newfoundland, Canada. Heidelberg: Springer, 2002: 310-324. |
[29] | BARRETO P S L M, LIBERT B, MCCULLAGH N, et al. Efficient and Provably-Secure Identity-based Signatures and Sign-cryption from Bilinear Maps[EB/OL]. , 2017-12-10. |
[1] | 赵志岩, 纪小默. 智能化网络安全威胁感知融合模型研究[J]. 信息网络安全, 2020, 20(4): 87-93. |
[2] | 刘敏, 陈曙晖. 基于关联融合的VoLTE流量分析研究[J]. 信息网络安全, 2020, 20(4): 81-86. |
[3] | 边玲玉, 张琳琳, 赵楷, 石飞. 基于LightGBM的以太坊恶意账户检测方法[J]. 信息网络安全, 2020, 20(4): 73-80. |
[4] | 杜义峰, 郭渊博. 一种基于信任值的雾计算动态访问控制方法[J]. 信息网络安全, 2020, 20(4): 65-72. |
[5] | 傅智宙, 王利明, 唐鼎, 张曙光. 基于同态加密的HBase二级密文索引方法研究[J]. 信息网络安全, 2020, 20(4): 55-64. |
[6] | 王蓉, 马春光, 武朋. 基于联邦学习和卷积神经网络的入侵检测方法[J]. 信息网络安全, 2020, 20(4): 47-54. |
[7] | 董晓丽, 商帅, 陈杰. 分组密码9轮Rijndael-192的不可能差分攻击[J]. 信息网络安全, 2020, 20(4): 40-46. |
[8] | 郭春, 陈长青, 申国伟, 蒋朝惠. 一种基于可视化的勒索软件分类方法[J]. 信息网络安全, 2020, 20(4): 31-39. |
[9] | 陈璐, 孙亚杰, 张立强, 陈云. 物联网环境下基于DICE的设备度量方案[J]. 信息网络安全, 2020, 20(4): 21-30. |
[10] | 江金芳, 韩光洁. 无线传感器网络中信任管理机制研究综述[J]. 信息网络安全, 2020, 20(4): 12-20. |
[11] | 刘建伟, 韩祎然, 刘斌, 余北缘. 5G网络切片安全模型研究[J]. 信息网络安全, 2020, 20(4): 1-11. |
[12] | 刘鹏, 何倩, 刘汪洋, 程序. 支持撤销属性和外包解密的CP-ABE方案[J]. 信息网络安全, 2020, 20(3): 90-97. |
[13] | 宋宇波, 樊明, 杨俊杰, 胡爱群. 一种基于拓扑分析的网络攻击流量分流和阻断方法[J]. 信息网络安全, 2020, 20(3): 9-17. |
[14] | 王腾飞, 蔡满春, 芦天亮, 岳婷. 基于iTrace_v6的IPv6网络攻击溯源研究[J]. 信息网络安全, 2020, 20(3): 83-89. |
[15] | 张艺, 刘红燕, 咸鹤群, 田呈亮. 基于授权记录的云存储加密数据去重方法[J]. 信息网络安全, 2020, 20(3): 75-82. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||