通信学报 ›› 2017, Vol. 38 ›› Issue (2): 16-24.doi: 10.11959/j.issn.1000-436x.2017024

• 学术论文 • 上一篇    下一篇

基于多项式同构的代理重签名方案

李慧贤1,邵璐1,庞辽军2   

  1. 1 西北工业大学计算机学院,陕西 西安 710072
    2 西安电子科技大学综合业务网国家重点实验室,陕西 西安 710071
  • 修回日期:2016-12-27 出版日期:2017-02-01 发布日期:2017-07-20
  • 作者简介:李慧贤(1977-),女,内蒙古乌兰浩特人,博士,西北工业大学副教授,主要研究方向为网络与信息安全、安全协议设计与分析等。|邵璐(1991-),女,陕西咸阳人,西北工业大学硕士生,主要研究方向为安全协议设计与分析。|庞辽军(1978-),男,陕西渭南人,博士,西安电子科技大学教授,主要研究方向为密码学、信息安全等。
  • 基金资助:
    国家自然科学基金资助项目(61103178);国家自然科学基金资助项目(61473214);陕西省自然科学基础研究计划基金资助项目(2015JM6294);陕西省自然科学基础研究计划基金资助项目(2016JM6002);陕西省自然科学基础研究计划基金资助项目(2015JM6294);中央高校基本科研业务费专项基金资助项目(3102015JSJ0003)

Proxy re-signature scheme based on isomorphisms of polynomial

Hui-xian LI1,Lu SHAO1,Liao-jun PANG2   

  1. 1 School of Computer Science and Engineering,Northwestern Polytechnical University,Xi'an 710072,China
    2 State Key Laboratory of Integrated Services Networks,Xidian University,Xi'an 710071,China
  • Revised:2016-12-27 Online:2017-02-01 Published:2017-07-20
  • Supported by:
    The National Natural Science Foundation of China(61103178);The National Natural Science Foundation of China(61473214);The Natural Science Basic Research Plan in Shaanxi Province of China(2015JM6294);The Natural Science Basic Research Plan in Shaanxi Province of China(2016JM6002);The Natural Science Basic Research Plan in Shaanxi Province of China(2015JM6294);The Fundamental Research Funds for the Central Universities(3102015JSJ0003)

摘要:

由于目前的代理重签名方案几乎都是基于大数分解、离散对数和椭圆曲线等问题设计的,无法抵抗量子攻击,提出了一个新的代理重签名方案。该方案通过借助多项式同构和秘密仿射变换技术,能够高效地完成代理重签名功能并且可以抵抗量子攻击。通过分析表明,该方案不但满足正确性与一致性,并且在随机预言机模型下具有不可伪造性。与现有的代理重签名方案相比,该方案不仅继承了多变量公钥密码体制的高效性与抗量子攻击性,还具有复用性、透明性和秘密代理性等特点。

关键词: 代理重签名, 多变量公钥密码体制, 多项式同构, 仿射变换

Abstract:

Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.

Key words: proxy re-signature, multivariate public key cryptosystem, isomorphisms of polynomial, affine transformation

中图分类号: 

No Suggested Reading articles found!