[1]韦性佳,芦殿军*.基于中国剩余定理的前向安全的聚合签名方案[J].计算机技术与发展,2021,31(04):137-141.[doi:10. 3969 / j. issn. 1673-629X. 2021. 04. 023]
 WEI Xing-jia,LU Dian-jun*.Forward Secure Aggregated Signature Scheme Based onChinese Remainder Theorem[J].,2021,31(04):137-141.[doi:10. 3969 / j. issn. 1673-629X. 2021. 04. 023]
点击复制

基于中国剩余定理的前向安全的聚合签名方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
31
期数:
2021年04期
页码:
137-141
栏目:
网络与安全
出版日期:
2021-04-10

文章信息/Info

Title:
Forward Secure Aggregated Signature Scheme Based onChinese Remainder Theorem
文章编号:
1673-629X(2021)04-0137-05
作者:
韦性佳芦殿军*
青海师范大学 数学与统计学院,青海 西宁 810008
Author(s):
WEI Xing-jiaLU Dian-jun*
School of Mathematics and Statistics,Qinghai Normal University,Xining 810008,China
关键词:
中国剩余定理前向安全性聚合签名强 RSA 假设随机预言模型抗存在性伪造
Keywords:
Chinese remainder theorem forward security aggregated signature strong RSA hypothesis random oracle model anti-existence forgery
分类号:
TP309
DOI:
10. 3969 / j. issn. 1673-629X. 2021. 04. 023
摘要:
随着信息技术的发展,信息安全研究成为目前国内外急需解决的突出问题。 数字签名技术作为信息安全领域的关键技术之一, 能有效地解决由于密钥泄露与敌手攻击等对用户造成的危害。 该文利用中国剩余定理,结合双线性对技术,基于椭圆曲线循环群提出了一种具有前向安全性质的聚合签名方案。 该方案具备如下特点:第一,利用强 RSA 假设实现了签名信息的前向安全性,即使敌手获取第 j 个时间段的签名信息,也无法得到关于之前签名的任何信息;第二,实现可信中心与签名用户的双向验证,可以有效甄别出方案中的伪造者,提高方案的安全性;第三,在随机预言模型下,证明了该方案抗存在性伪造;第四,方案的实现基于椭圆曲线循环群,能有效减少签名的计算量与存储空间。
Abstract:
With the development of information technology, information security research has become an outstanding problem that needs to be solved urgently at home and? abroad. As one of the key technologies in the field of information security, digital signature technology can effectively solve the harm caused to users due to key leakage and adversary attacks. Using the Chinese residual theorem, combined with bilinear pairing technology, based on the elliptic curve cyclic group, we propose an aggregate signature scheme with forward security properties. The scheme has the following characteristics: Firstly, using the strong RSA assumption to achieve forward security? ? of the signature information, even if the adversary obtains the signature information of the j time period, he cannot get any information about the previous signature; secondly,the implementation of the trusted center and the signature user two-way verification can effectively identify the forgers in the scheme and improve the safety of the scheme;thirdly,under the random oracle model,it is proved that the scheme is re鄄sistant to existence forgery; fourthly, the realization of the scheme is based on the elliptic curve cyclic group, effectively reducing the amount of signature calculation and storage space.

相似文献/References:

[1]邢国正 江雨燕 李洁.数据库加密与验证机制的研究[J].计算机技术与发展,2008,(12):166.
 XING Guo-zheng,JIANG Yu-yan,LI Jie.Research on Database Encryption and Confirmation Mechanism[J].,2008,(04):166.
[2]汪精明 王平水.两个群签名方案的安全性分析[J].计算机技术与发展,2007,(09):149.
 WANG Jing-ming,WANG Ping-shui.Security Analysis of Two Group Signature Schemes[J].,2007,(04):149.
[3]蔡庆华.一个基于椭圆曲线的前向安全的签密方案[J].计算机技术与发展,2007,(12):132.
 CAI Qing-hua.A Signcryption Scheme with Forward Security Based on ECC[J].,2007,(04):132.
[4]杨坤伟,李吉亮,张瑞丽.中国剩余定理在密码学中的应用研究[J].计算机技术与发展,2014,24(01):238.
 YANG Kun-wei,LI Ji-liang,ZHANG Rui-li.Application of Chinese Remainder Theorem in Cryptography[J].,2014,24(04):238.
[5]周素芳[],杨晓博[],刘新[][]. 一种加强的基于中国剩余定理的群签名[J].计算机技术与发展,2014,24(11):175.
 ZHOU Su-fang[],YANG Xiao-bo[],LIU Xin[][]. An Enhanced Group Signature Scheme Based on Chinese Remainder Theorem[J].,2014,24(04):175.
[6]陈延利[],边巴旺堆[],郭晋丞[],等. 应急通信的安全响应体系研究[J].计算机技术与发展,2015,25(04):108.
 CHEN Yan-li[],BIAN Ba-wangdui[],GUO Jin-cheng[],et al. Research on Security Response System of Communication Emergency[J].,2015,25(04):108.
[7]韦性佳,张京花,芦殿军.基于ECC 的具有前向安全性的 VSS 方案[J].计算机技术与发展,2018,28(04):157.[doi:10.3969/ j. issn.1673-629X.2018.04.033]
 WEI Xing-jia,ZHANG Jing-hua,LU Dian-jun.A Forward Security Secret Sharing Scheme Based on ECC[J].,2018,28(04):157.[doi:10.3969/ j. issn.1673-629X.2018.04.033]

更新日期/Last Update: 2020-04-10