期刊文献+

数字签密综述 被引量:32

A Survey of Digital Signcryption
在线阅读 下载PDF
导出
摘要 签密能够在一个合理的逻辑步骤内同时完成数字签名和公钥加密两项功能,而其计算量和通信成本都要低于传统的"先签名后加密"。文章总结和分析了签密体制的研究进展,根据公钥认证方法将其归类为基于PKI的签密体制、基于身份的签密体制和无证书签密体制。每一类签密体制又进一步分为基本签密体制、具有特殊性质的签密体制和混合签密体制。文章给出了基于PKI的签密体制和基于身份的签密体制的形式化模型。指出了需要进一步研究的问题。该文有助于理解1997年至2011年之间签密体制的研究情况。 Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this article, the state-of-the-art of signcryption is surveyed. This paper classifies signcryption as PKI-based signcryption, identity-based signcryption and certificateless signcryption according to the authentication method of public keys. Each classification is classified further as basic signcryption, signcryption with special properties and hybrid signcryption. The formal models of PKI-based signcryption and identity-based signcryption are also given. Some possible future work is pointed out. The survey helps in understanding the research work that has been carried out in the area of signcryption from the year 1997 to 2011.
作者 李发根 钟笛
出处 《信息网络安全》 2011年第12期1-8,共8页 Netinfo Security
基金 国家自然科学基金[60803133 61073176] 中央高校基本科研业务费专项资金
关键词 密码学 签密 PKI 基于身份 无证书 cryptography signcryption PKI identity-based certificateless
  • 相关文献

参考文献45

  • 1Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption). Cost (signature)+ cost (encryption) [C]Advances in Cryptology-CRYPTO' 97, LNCS 1294, Springer-Verlag, 1997. 165-179.
  • 2H. Petersen, M. Michels. Cryptanalysis and improvement of signcryption schemes[J]. IEE Proceedings-Computers and Digital Techniques, 1998, vol. 145, no. 2:149-151.
  • 3F. Bao, R.H. Deng. A signcryption scheme with signature directly verifiable by public key[C]In Proc. Public Key Cryptography-PKC' 98, LNCS 1431, Springer-Verlag, 1998.55-59.
  • 4D.H. Yum, P.J. Lee. New signcryption schemes based on KCDSA[C]lnformation Security and Cryptology-ICISC2001, LNCS 2288, Springer Verlag, 2002. 305-317.
  • 5J.B. Shin, K. Lee, and K. Shim. New DSA-verifiable signcryption schemes[C].Information Security and Cryptology-ICISC 2002, LNCS 2587, Springer-Verlag, 2003.35-47.
  • 6H.Y. Jung, D.H. Lee, J.l. Lim, and K.S. Chang, Signcryption schemes with forward secrecy[C]. Information Security Application-WISA 2001, Seoul, Korea, 2001. 463-475.
  • 7R. Steinfeld, Y. Zheng. A signcryption scheme based on integer factorization[C]lnformation Security Workshop-ISW 2000, LNCS 1975, Springer-Verlag, 2000. 308-322.
  • 8J. Malone-Lee and W. Mao, Two birds one stone: signcryption using RSA[CITopics in Cryptology-CT-P, SA 2003, LNCS 2612, Springer Verlag, 2003.211-226.
  • 9Y. Zheng, H. Imai. How to construct efficient signcryption schemes on elliptic curves[J]. Information Processing Letters, 1998, vol. 68, no. 5:227-233.
  • 10J. Baek, P-. Steinfeld, and Y. Zheng. Formal proofs for the security of signcryption[J]. Journal of Cryptology, 2007, vol. 20, no 2, 203-235.

同被引文献182

引证文献32

二级引证文献143

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部