用户名: 密码: 验证码:
基于SM2的代理保护代理签名的设计与实现
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Design and implementation of proxy-protected proxy signature based on SM2
  • 作者:郭青霄 ; 张大伟 ; 常亮 ; 刘晓东 ; 宋靖文
  • 英文作者:GUO Qing-xiao;ZHANG Da-wei;CHANG Liang;LIU Xiao-dong;SONG Jing-wen;School of Computer and Information Technology, Beijing Jiaotong University;Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology;Institute of Network Information Security, Shandong University;
  • 关键词:椭圆曲线 ; 代理签名 ; 代理保护代理签名 ; SM2数字签名
  • 英文关键词:elliptic curve;;proxy signature;;proxy-protected proxy signature;;SM2 digital signature
  • 中文刊名:WXAQ
  • 英文刊名:Chinese Journal of Network and Information Security
  • 机构:北京交通大学计算机与信息技术学院;桂林电子科技大学广西可信软件重点实验室;山东大学网络信息安全研究所;
  • 出版日期:2017-09-15
  • 出版单位:网络与信息安全学报
  • 年:2017
  • 期:v.3;No.22
  • 基金:国家自然科学基金资助项目(No.61672091);; 广西可信软件重点实验室研究课题基金资助项目(No.KX201531)~~
  • 语种:中文;
  • 页:WXAQ201709006
  • 页数:8
  • CN:09
  • ISSN:10-1366/TP
  • 分类号:51-58
摘要
基于国产密码算法SM2数字签名标准,设计了一种代理保护代理签名方案。通过对代理授权机制的设计,实现了对代理签名者的保护;通过对SM2数字签名算法的改进,实现了代理者代表原始签名者的代理签名;安全分析表明,设计的算法具有可验证性、可识别性、可区分性、不可否认性和强不可伪造性。最后,利用C语言及Polarssl库对该方案进行了实现,并与SM2数字签名进行了性能比较。分析表明,该算法在性能上具有较好的可用性。
        Based on the SM2 digital signature standard, a proxy-protected proxy signature scheme was designed. Through the design of the agent authorization mechanism, the protection of the proxy signer was realized. The proxy signature was realized by the proxy signer who represents the original signer through the improvement of the SM2 digital signature algorithm. The security analysis shows that the designed algorithm is verifiable, identifiable, distinguishable, non-repudiation, and strong unforgeability. Finally, the program was implemented using the C language and the Polarssl library, and the performance was compared with the SM2 digital signature. The analysis shows that the algorithm has good usability in performance.
引文
[1]NEAL K.Elliptic curve cryptosystems[J].Mathematics of Computation,1987,48(177):203-209.
    [2]杜洁璇.椭圆曲线密码系统的研究与实现[D].北京:北京邮电大学,2010.DU J X.Elliptic curve cryptography system research and implementation[D].Beijing:Beijing University of Posts and Telecommunications,2010.
    [3]李湛.一种改进的椭圆曲线密码实现算法[J].电子科技,2004(7):31-33.LI Z.An improved algorithm for Elliptic curve cryptography[J].Electronic Science and Technology,2004(7):31-33.
    [4]汪朝晖,张振峰.SM2椭圆曲线公钥密码算法综述[J].信息安全研究.2016,2(11):972-982.WANG ZH,ZHANG Z F.Overview of SM2 Elliptic curve public key cryptography[J].Information Security Research,2016,2(11):972-982.
    [5]MAMBO M,USUDA K,OKAMOTO E.Proxy signatures for delegating signing operation[C].ACM Conference on Computer and Communications Security,1996:48-57.
    [6]白国强,黄谆,陈弘毅,等.基于椭圆曲线的代理数字签名[J].电子学报,2003,31(11):1659-1663.BAI G Q,HUANG Z,CHEN H Y,et al.Proxy digital signature based on elliptic curve[J].Acta Electronic Journal.2003,31(11):1659-1663.
    [7]张宁,傅晓彤,肖国镇.对基于椭圆曲线的代理签名的研究与改进[J].西安电子科技大学学报,2005,32(2):280-283.ZHANG N,FU X T,XIAO G Z.Study and improvement of agent signature based on Elliptic Curve[J].Journal of Xidian University,2005,32(2):280-283.
    [8]CHANG M H,CHEN I T,CHEN M T.Design of Proxy Signature in ECDSA[C]//Eighth International Conference on Intelligent Systems Design and Applications,2008.2008:17-22.
    [9]胡兰兰,郑康锋,杨义先,等.一种改进的椭圆曲线安全代理签名方案倡[J].计算机应用研究.2010,27(2).HU L L,ZHENG K F,YANG Y X,et al.An improved elliptic curve security proxy signature scheme[J].Journal of Computer Applications,2010,27(2).
    [10]李继国,曹珍富,李建中,等.代理签名的现状与进展[J].通信学报,2003(10):114-124.LI J G,CAO Z F,LI J Z,et al.Status and progress of proxy signature[J].Journal of Communications,2003(10):114-124.
    [11]DIFFIE W,HELLMAN M.Multiuser cryptographic techniques[J].Proceedings of AFIPS 1976 NCC,1976:109-112.
    [12]DIFFIE W.The first ten years of public-key Cryptography[J].IEEE,1992:135-175.
    [13]周亮.代理签名及扩展的关键问题研究[D].北京:北京邮电大学,2008.ZHOU L.Proxy signature and expansion of the key issues[D].Beijing:Beijing University of Posts and Telecommunications,2008.
    [14]LEE B,KIM H,KIM K.Strong proxy signature and its applications[J].SCIS.2001.
    [15]VARADHARAJAN V,ALLEN P,BLACK S.An analysis of the proxy problem in distributed systems[C]//1991 IEEE Computer Society Symposium on Research in Security and Privacy 1991:255-275.
    [16]张焕国.SM2数字签名算法[EB/OL].2015.https://wenku.baidu.com/view/9dbf8a3d04a1b0717ed5dd12.html.ZHANG H G.SM2 digital signature algorithm[EB/OL].https://wenku.baidu.com/view/9dbf8a3d04a1b0717ed5dd12.html.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700