通信学报 ›› 2013, Vol. 34 ›› Issue (8): 185-190.doi: 10.3969/j.issn.1000-436x.2013.08.024

• 学术通信 • 上一篇    

无双线性对的基于身份的在线/离线门限签名方案

杨小东,李春梅,徐婷,王彩芬   

  1. 西北师范大学 计算机科学与工程学院,甘肃 兰州 730070
  • 出版日期:2013-08-25 发布日期:2017-08-31
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;西北师范大学青年教师科研提升计划基金资助项目;西北师范大学青年教师科研提升计划基金资助项目

ID-based on-line/off-line threshold signature scheme without bilinear pairing

Xiao-dong YANG,Chun-mei LI,Ting XU,Cai-fen WANG   

  1. College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China
  • Online:2013-08-25 Published:2017-08-31
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Founda-tion for Excellent Young Teachers by Northwest Normal University;The Founda-tion for Excellent Young Teachers by Northwest Normal University

摘要:

为了减少公钥密码体制中证书管理带来的开销和提高在线/离线门限签名方案的性能,利用分布式密钥生成协议和可验证秘密共享协议,提出了一种基于身份的在线/离线门限签名方案,并在离散对数假设下证明了新方案满足顽健性和不可伪造性。分析结果表明,新方案避免了传统公钥证书的管理问题和复杂的双线性对运算,大大降低了离线门限签名算法和签名验证算法的计算复杂度,在效率上优于已有的在线/离线门限签名方案。

关键词: 在线/离线门限签名, 基于身份的密码体制, 双线性对, 可模拟性

Abstract:

Based on the distributed key generation (DKG) protocol and verifiable secret sharing (VSS) protocol,an identity-based on-line/off-line threshold signature scheme was proposed in order to eliminate the cost of the certificate management in the public key cryptosystem and improve the performance of on-line/off-line threshold signature schemes.This scheme was proven to be robust and unforgeable under the discrete logarithm assumption.Analysis results show that the proposed scheme eliminates the problem of certificate management and pairing operation,and it greatly reduces computation cost of off-line threshold signature generation algorithm and signature verification algorithm.The new scheme is more efficient than the available on-line/off-line threshold signature schemes.

Key words: on-line/off-line threshold signature, identity-based cryptography, bilinear pairing, simulability

No Suggested Reading articles found!