期刊文献+

一种基于身份的签密方案 被引量:6

Identity-based Signcryption Scheme
在线阅读 下载PDF
导出
摘要 利用双线性对提出一种基于身份的签密方案。在BDH问题是困难的假设下,运用随机预言机模型证明该方案的安全性。该方案满足机密性、不可伪造性、不可否认性、公开验证性和前向安全性,仅需4次对运算,其中2次为可预运算。与当前较为高效的几个方案相比,该方案的运算量更低。 This paper proposes a new identity-based signcryption scheme using bilinear pairings and proves its security in the random oracle model while assuming the hardness of Bilinear Diffie-Hellman(BDH) problem.The scheme satisfies confidentiality,unforgeability,nonrepudiation,public verification and forward security.It only costs four pairing operations and two of them can be precomputed.Compared with the efficient schemes up to date,computation cost of the proposed scheme is less.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第8期135-137,共3页 Computer Engineering
关键词 签密 基于身份的加密 双线性对 signcryption Identity-Based Encryption(IBE) bilinear pairings
  • 相关文献

参考文献6

  • 1Zheng Yuliang.Digital Signcryption or How to Achieve Cost (Signature & Encryption)《《(Cost(Signature)+Cost (Encryption))[C]// Proc.of CRYPTO'97.Berlin,Germany:Springer-Verlag,1997.
  • 2Shamir A.Identity-based Cryptosystems and Signature Schemes[C]// Proc.of CRYPTO'84.Berlin,Germay:Springer-Verlag,1984.
  • 3Franklinm B D.Identity-based Encryption from the Weil Pairing[J].SIAM Journal of Computing,2003,32(3):586-615.
  • 4Malone-Lee J.Identity Based Signcryption[EB/OL].(2002-07-19).http://eprint.iacr.org/2002/098.
  • 5Chen Liqun,Malone-Lee J.Improved Identity-based Signcryp-tion[C]//Proc.of PKC'05.Berlin,Germany:Springer-Verlag,2005.
  • 6李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73

二级参考文献15

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:104
  • 3Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179
  • 4Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81
  • 5Pang X. , Tan K. L. , Wang Y. , Ren J.. A secure agent-mediated payment protocol. In: Deng R. H. , Qing S. , Bao F. ,Zhou J. eds.. Information and Communications Security-ICICS 2002, Lecture Notes in Computer Science 2513. Berlin:Springer-Verlag, 2002, 422-433
  • 6Shamir A.. Identity-based cryptosystems and signature schemes. In: Blakley G. R. , Chaum D. eds.. Advances in Cryptology-CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984, 47-53
  • 7Boneh D. , Franklin M.. Identity-based encryption from the Weil pairing. In: Kilian J. ed.. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001, 213-229
  • 8Malone-Lee J.. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, IACR, 2002
  • 9Libert B. , Quisquater J.. A new identity based signcryption schemes from pairings. In: Proceeding of the 2003 IEEE Information Theory Workshop, Paris, France, 2003, 155-158
  • 10Nalla D., Reddy K. C.. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report2003/066, IACR, 2003

共引文献72

同被引文献36

引证文献6

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部