高级检索
    陈明, 袁少良. 标准模型下可证明安全的基于身份多代理签名[J]. 计算机研究与发展, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197
    引用本文: 陈明, 袁少良. 标准模型下可证明安全的基于身份多代理签名[J]. 计算机研究与发展, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197
    Chen Ming, Yuan Shaoliang. Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197
    Citation: Chen Ming, Yuan Shaoliang. Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197

    标准模型下可证明安全的基于身份多代理签名

    Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model

    • 摘要: 基于身份多代理签名的2类主要形式化安全模型分别存在敌手攻击目标不准确和敌手分类不完备的问题,而且,目前仍缺乏真正可证明安全的有效方案.融合现有安全模型,重新定义了基于身份多代理签名的标准安全模型.新模型立足于改进现有模型存在的问题,采用更加完备的敌手分类标准,形式化定义各类敌手的行为和攻击目标,采用简单清晰的证明结构.在新安全模型框架下,提出一种基于身份的多代理签名方案,其安全性被规约为多项式时间敌手求解CDH问题.此外,着重分析了最近提出的一种基于身份多代理签名方案及其安全模型,指出其中的3个主要缺陷.对比分析表明,新的安全模型更加完备,新提出的多代理签名是一种真正的、在标准模型下可证明安全的基于身份密码方案.

       

      Abstract: Multi-proxy signature schemes are quite useful tools while a signer requires delegating his signing right to a group of proxy signers. There are two main types of formal security models of multi-proxy signatures. However, they have deficiencies, respectively. One of them is complicated, and does not model the chosen warrant attacks; the other model does have the incomplete definition of adversary. Meanwhile, there is so far no provably secure identity-based multi-proxy signature scheme. In this paper, we give a formal security model of the identity-based multi-proxy signature schemes, and propose an identity-based multi-proxy signature scheme. Our security model compensates for deficiencies in existing models. It defines more powerful adversary capacity, formalizes the behaviors of the adversaries, and adopts simple and clear proof structure. The proposed identity-based multi-proxy signature scheme is based on the well-studied CDH (computational Diffie-Hellman) assumption, and is proven existentially unforgeable against chosen message/warrant attacks in our security model. In addition, we present that there are three security flaws in a recent proposed identity-based multi-proxy signature scheme and in its security model. Comparative analysis shows that the new security model is more complete, and the new multi-proxy signature scheme is a real and provably secure identity-based cryptosystem in the standard model.

       

    /

    返回文章
    返回