通信学报 ›› 2019, Vol. 40 ›› Issue (5): 153-162.doi: 10.11959/j.issn.1000-436x.2019072

• 学术论文 • 上一篇    下一篇

标准模型下可撤销的基于身份的代理重签名方案

杨小东1,2,李雨潼1,王晋利1,麻婷春1,王彩芬1   

  1. 1 西北师范大学计算机科学与工程学院,甘肃 兰州 730070
    2 密码科学技术国家重点实验室,北京 100878
  • 修回日期:2018-08-16 出版日期:2019-05-25 发布日期:2019-05-30
  • 作者简介:杨小东(1981- ),男,甘肃甘谷人,博士,西北师范大学副教授,主要研究方向为代理重签名和云计算安全。|李雨潼(1994- ),男,甘肃兰州人,西北师范大学硕士生,主要研究方向为应用密码学与车联网安全。|王晋利(1993- ),女,山西泽州人,西北师范大学硕士生,主要研究方向为信息安全理论与技术。|麻婷春(1992- ),女,甘肃武威人,西北师范大学硕士生,主要研究方向为大数据安全。|王彩芬(1963- ),女,河北安国人,博士,西北师范大学教授、博士生导师,主要研究方向为密码协议和网络编码。
  • 基金资助:
    国家自然科学基金资助项目(61662069);国家自然科学基金资助项目(61562077);中国博士后科学基金资助项目(2017M610817);兰州市科技计划基金资助项目(2013-4-22);西北师范大学青年教师科研能力提升计划基金资助项目(NWNU-LKQN-14-7)

Revocable identity-based proxy re-signature scheme in the standard model

Xiaodong YANG1,2,Yutong LI1,Jinli WANG1,Tingchun MA1,Caifen WANG1   

  1. 1 College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China
    2 State Key Laboratory of Cryptology,Beijing 100878,China
  • Revised:2018-08-16 Online:2019-05-25 Published:2019-05-30
  • Supported by:
    The National Natural Science Foundation of China(61662069);The National Natural Science Foundation of China(61562077);China Postdoctoral Science Foundation Project(2017M610817);The Science and Technology Project of Lanzhou(2013-4-22);The Foudation for Excellent Yong Teachers by Northwest Normal University(NWNU-LKQN-14-7)

摘要:

用户撤销是基于身份的代理重签名方案在应用中必须解决的重要问题。针对目前基于身份的代理重签名方案不支持用户撤销的问题,引入了可撤销的基于身份代理重签名密码体制,并给出了相应的形式化定义和安全模型。基于代理重签名方案和二叉树结构,构造了一个可撤销的基于身份的代理重签名方案。在所构造的方案中,用户的签名密钥由秘密密钥和更新密钥两部分组成。通过安全信道传输的秘密密钥是固定的,但利用公开信道广播的更新密钥是周期性变化的。只有未被撤销的用户才能获得更新密钥,并使秘密密钥随机化,更新密钥生成当前时间段的签名密钥。在标准模型下证明了所构造的方案在适应性选择身份和消息攻击下是存在不可伪造的,并满足双向性、多用性和抗签名密钥泄露攻击性。分析结果表明,所构造的方案高效地实现了用户的撤销与密钥的更新,具有良好的延展性。

关键词: 基于身份的代理重签名, 用户撤销, 标准模型, 签名密钥泄露, 二叉树

Abstract:

User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable identity-based proxy re-signature was introduced.Furthermore,the formal definition and security model of revocable identity-based proxy re-signature were presented.Based on proxy re-signature scheme and binary tree structure,a revocable identity-based proxy re-signature scheme was proposed.In the proposed,scheme,the user's signing key consists of two parts,a secret key and an update key.The secret key transmitted over the secure channel is fixed,but the update key broadcasted by the public channel is periodically changed.Only the user who has not been revoked can obtain the update key,and then randomize the secret key and update the key to generate the corresponding signature key of the current time period.In the standard model,the proposed scheme is proved to be existentially unforgeable against adaptive chosen-identity and chosen-message attacks.In addition,the proposed scheme has properties of bidirectionality and multi-use,and can resist signing key exposure attacks.The analysis results show that the proposed scheme can efficiently revoke the user and update the user’s key,and thus it has good scalability.

Key words: identity-based proxy re-signature, user revocation, standard model, signing key exposure, binary tree

中图分类号: 

No Suggested Reading articles found!