华南理工大学学报(自然科学版) ›› 2005, Vol. 33 ›› Issue (6): 23-27.

• • 上一篇    下一篇

基于双线性对和身份的Chameleon签名方案

杜欣军 王 莹 葛建华 王育民   

  1. 西安电子科技大学 计算机网络与信息安全教育部重点实验室,陕西 西安 710071
  • 收稿日期:2004-02-04 出版日期:2005-06-25 发布日期:2005-06-25
  • 通信作者: 杜欣军(1974-),男,博士生,主要从事无线网络安全研究 E-mail:dxjwy2002@hotmail.com
  • 作者简介:杜欣军(1974-),男,博士生,主要从事无线网络安全研究
  • 基金资助:

    国家通信保密基金资助项目(J6410130);国家自然科学基金重点资助项目(69931010)

ID-Based Chameleon Signature Scheme from Bilinear Pairing

Du Xin-jun  Wang Ying  Ge Jian-hua  Wang Yu-min   

  1. Key Laboratory of Computer Networks and Information Security,the Ministry of Education Xidian Univ.,Xi’an 710071,Shaanxi, China
  • Received:2004-02-04 Online:2005-06-25 Published:2005-06-25
  • Contact: Du Xin-jun(born in 1974),ma1e. Ph.D.can—didate,mainly researches on wireless network safetv. E-mail:dxjwy2002@hotmail.com
  • About author:Du Xin-jun(born in 1974),ma1e. Ph.D.can—didate,mainly researches on wireless network safetv.
  • Supported by:

    Suppofled by the Project of National Communication and Security Foundation of China (J6410130)and the Key Project of National Natuml Science
    Foundation of China(69931010)

摘要: Chameleon签名方案是一种基于Hash—and—Sign模式的非交互签名方案,就效率而言该方案和普通的签名方案类似.Chameleon签名方案具有非转移性,也就是只有指定的接收方才可以验证签名的有效性.文中提出了一种基于双线性对和身份的Chameleon Hash函数,并以此构建了一个基于身份的Chameleon签名方案.和传统的Chameleon Hash方案相比,基于身份的Chameleon签名方案中公开Hash密钥的所有者无需恢复相应的私钥.该方案具有普通Chameleon签名方案的所有特点,同时还具有利用双线性对构建的基于 身份的密码系统的诸多优点.

关键词: 双线性对, Chameleon Hashing, 基于身份的Chameleon签名

Abstract:

Chameleon signature schemes are non-interactive signature schemes based on a Hash-and-Sign para-d gm,and are s m lar in efficiency to original signature schemes. However,Chameleon signature schemes Dos-sess non-tranterability,that is to say, only the designated recipient can verify the validitv of a signature.In this papc,an ID-based Chameleon Hash function from the bilinear pairing is proposed, according to which an ID-based Chameleon signature scheme is constructed. As Compared with the conventional Chameleon Hash tunctions,the owner of a public Hash key in the ID-based Chameleon signature scheme does not need to re-trieve the assoc ated secret key.The proposed scheme possesses all the attributes of original Chameleon signa-tures.Moreover,it s of the advantages of the ID-based cryptography based on the bilinear pairing.

Key words: bilinear pairing, Chameleon Has hing, ID-based Chameleon signature