东北大学学报:自然科学版 ›› 2014, Vol. 35 ›› Issue (12): 1692-1696.DOI: 10.12068/j.issn.1005-3026.2014.12.005

• 信息与控制 • 上一篇    下一篇

一种不可否认的门限代理签名方案

刘丹妮, 王兴伟, 黄敏   

  1. (东北大学 信息科学与工程学院, 辽宁 沈阳 110819)
  • 收稿日期:2013-09-24 修回日期:2013-09-24 出版日期:2014-12-15 发布日期:2014-09-12
  • 通讯作者: 刘丹妮
  • 作者简介:刘丹妮(1975-),女,黑龙江哈尔滨人,东北大学博士研究生; 王兴伟(1968-),男,辽宁盖州人,东北大学教授,博士生导师; 黄敏(1968-),女,辽宁沈阳人,东北大学教授,博士生导师.
  • 基金资助:
    国家杰出青年科学基金资助项目(61225012,71325002); 高等学校博士学科点专项科研基金优先发展领域资助项目(20120042130003); 中央高校基本科研业务费专项资金资助项目(N110204003,N120104001)

A Kind of Threshold Proxy Signature Scheme with Nonrepudiation Property

LIU Dan-ni, WANG Xing-wei, HUANG Min   

  1. School of Information Science &Engineering, Northeastern University, Shenyang 110819, China.
  • Received:2013-09-24 Revised:2013-09-24 Online:2014-12-15 Published:2014-09-12
  • Contact: WANG Xing-wei
  • About author:-
  • Supported by:
    -

摘要: 针对目前的门限代理签名方案计算复杂性高、通信量大的问题,提出一种不可否认的门限代理签名方案.为提高安全性,在签名人向CA申请公钥证书时,CA采用零知识证明的方法对与该公钥相关的私钥进行验证,保证该公钥未被篡改.为提高运行效率,代理份额产生阶段,原始签名人只需计算一个公共的代理份额,广播给代理群,各个群成员并行地生成自己的代理密钥,与原始签名人逐一为每个代理群成员生成代理密钥的串行操作相比,减少了计算量.采用将敌手分为三类的安全模型,仿真各类敌手伪造签名的过程,证明方案的安全性.

关键词: 密码学, 代理签名, 门限代理签名, 零知识证明, 敌手

Abstract: To overcome the drawbacks, such as high computational complexity and heavy communication, in the present threshold proxy signature schemes, a nonrepudiable threshold proxy signature scheme was proposed. To improve the security,when a signer applies for public key certificate to the CA, the CA validates the signer′s private key associated with the signer′s public key by the method of zero-knowledge proof. To improve the efficiency, in the phase of proxy key generation, original signer only needs to calculate and broadcast a public proxy share to the proxy group, and the group members generate their own proxy keys concurrently. Comparing with the schemes that original signer generates proxy keys one by one for all the proxy members, the amount of calculation was greatly reduced by the proposed method. The security model of three types of adversaries was proposed. It was simulated that the adversaries forge the signature. The new scheme was proved to be secure by the simulation process.

Key words: cryptography, proxy signature, threshold proxy signature, zero-knowledge proof, adversary

中图分类号: