通信学报 ›› 2021, Vol. 42 ›› Issue (12): 17-26.doi: 10.11959/j.issn.1000-436x.2021223

• 学术论文 • 上一篇    下一篇

基于身份的可穿刺签名方案

杨冬梅, 陈越, 魏江宏, 胡学先   

  1. 信息工程大学数据与目标工程学院,河南 郑州 450001
  • 修回日期:2021-11-03 出版日期:2022-12-25 发布日期:2021-12-01
  • 作者简介:杨冬梅(1977- ),女,河南夏邑人,信息工程大学博士生,主要研究方向为应用密码学、大数据安全等
    陈越(1965- ),男,河南开封人,博士,信息工程大学教授、博士生导师,主要研究方向为网络与信息安全、大数据安全
    魏江宏(1987- ),男,甘肃通渭人,博士,信息工程大学讲师,主要研究方向为应用密码学、数据安全与隐私保护、机器学习安全等
    胡学先(1982- ),男,湖北红安人,博士,信息工程大学副教授,主要研究方向为密码协议、大数据安全、隐私保护等
  • 基金资助:
    国家自然科学基金资助项目(62172433);国家自然科学基金资助项目(62172434)

Identity-based puncturable signature scheme

Dongmei YANG, Yue CHEN, Jianghong WEI, Xuexian HU   

  1. School of Data and Target Engineering, Information Engineering University, Zhengzhou 450001, China
  • Revised:2021-11-03 Online:2022-12-25 Published:2021-12-01
  • Supported by:
    The National Natural Science Foundation of China(62172433);The National Natural Science Foundation of China(62172434)

摘要:

针对已有前向安全的基于身份签名(IBS)方案在实际可用性和密钥更新效率方面存在的不足,基于可穿刺公钥加密方案的思想,提出了基于身份的可穿刺签名(IBPS)方案。具体而言,首先给出了IBPS的形式化定义和安全性定义,然后基于布隆过滤器构造了一个具体的IBPS方案。在计算性Diffie-Hellman假设下,所提方案在随机预言模型下满足存在不可伪造性。性能分析与仿真实验表明,所提方案比传统的前向安全IBS方案提供了更实用的细粒度前向安全性,且密钥更新过程更高效。

关键词: 私钥泄露, 基于身份的签名, 可穿刺签名, 布隆过滤器

Abstract:

To overcome the shortcomings of available forward-secure identity-based signature (IBS) scheme in terms of actual practicability and secret key update efficiency, the notion of identity-based puncturable signature (IBPS) scheme was proposed based on the idea of puncturable public-key encryption scheme.Specifically, the syntax and security notion of IBPS were given, and then a concrete IBPS scheme was constructed based on Bloom filter.Under the computational Diffie-Hellman assumption, the proposed scheme achieved the existential unforgeability in the random oracle model.The performance analysis and implementation results demonstrate that, compared with traditional forward-secure IBS schemes, the proposed scheme provides more practical fine-grained forward secrecy, and has higher efficiency of secret key update.

Key words: key exposure, identity-based signature, puncturable signature, Bloom filter

中图分类号: 

No Suggested Reading articles found!