期刊文献+

基于身份的公开验证签密方案 被引量:4

ID-based public verifiability signcryption scheme
在线阅读 下载PDF
导出
摘要 基于双线性对,提出了一个基于身份的签密方案。在计算Diffie-Hellman(CDH)问题困难的假设下,证明了方案在随机预言模型下能够抵抗自适应性选择消息和身份攻击。方案基于身份,不需要证书,从而简化了密钥管理。此外,所提方案不仅可用于公开验证,在不需要泄露接收者私钥的前提下,可由第三方认证密文确实是对应明文的有效签密值。 Using bilinear pairing,a new identity-based signcryption scheme was proposed in this paper.Under the assumption that the Computational Diffie-Hellman(CDH) problem is hard,the newly proposed scheme had been proved to be secure against the existing unforgeability on adaptively chosen message/ciphertext and identity attack in random oracle model.The advantage of the proposed scheme is that it is identity-based which needs no certificates so that it has a simple key management.In addition,the proposed scheme can provide public verifiability,and it allows a third party to convince that the signcryption is valid for the given message without providing the receiver's private key.
出处 《计算机应用》 CSCD 北大核心 2012年第1期99-103,共5页 journal of Computer Applications
基金 江苏省自然科学基金资助项目(BK20082140) 淮海工学院引进人才科研启动基金资助项目(KQ10121) 淮海工学院校内课题项目(KX10530)
关键词 签密方案 公开验证 可证安全 基于身份 随机预言模型 signcryption scheme public verification provably secure identity-based random oracle model
  • 相关文献

参考文献10

  • 1ZHENG YULIANG. Digital signcryption or how to achieve cost ( signature & encryption) < < cost (signature) + cost (encryption) [ C]// CRYPTO'97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, LNCS 1294. Berlin: Springer-Verlag, 1997:165-179.
  • 2BAEK J, STEINFELD R, ZHENG Y. Formal proofs for the security of signcryption [C]// PKC 2002: Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosysterns: Public Key Cryptography, LNCS 2274. Berlin: Springer-Vetlag, 2002: 80-98.
  • 3LEE M J. Identity-based signcryption [EB/OL]. [2011-04-11]. http://eprint, iacr. org/ report 2002/98.
  • 4LIBERT B, QUISQUATER J J. Efficient signcryption with key privacy from Gap Diffie-Hellman groups [C]//PKC 2004: Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, LNCS 2947. Berlin: Springer-Verlag, 2004: 187 - 200.
  • 5张串绒,肖国镇.一个可公开验证签密方案的密码分析和改进[J].电子学报,2006,34(1):177-179. 被引量:16
  • 6CHOW S M, YIU S M, HUI E K, et al. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity [C]// ICICS 2003: Proceedings of the 6th International Conference on Information Security and Cryptology, LNCS 2971. Berlin: Springer-Verlag, 2004:352-369.
  • 7MU Y, VARADHARAJAN V. Distributed signcryption [C]// INDOCRYPT 2000: Proceedings of the First International Conference on Progress in Cryptology, LNCS 1977. Berlin: Springer-Verlag, 2000:155 - 164.
  • 8PIEPRZYK J, POINTCHEVAL D. Parallel authentication and public-key encryption [ C]//ACISP 2003: Proceedings of the 8th Australasian Conference on Information Security and Privacy, LNCS 2727. Berlin: Springer-Verlag, 2003:387-401.
  • 9YANG G, WONG D S, DENG X. Analysis and improvement of a signcryption scheme with key privacy [C]//ISC 2005: Proceedings of the 8th International Conference on Information Security, LNCS 3650. Berlin: Springer-Verlag, 2005:218-232.
  • 10TSO R, OKAMOTO T, OKAMOTO E. ECDSA-Verifiable signcryption scheme with signature verification on the signcrypted message [ C]//Inscrypt 2007: Proceedings of the Third SKLOIS Conference on Information Security and Cryptology, LNCS 4990. Berlin: Springer-Verlag, 2008:11 - 24.

二级参考文献8

  • 1Y L Zheng.Signcryption and its applications in efficient public key solutions[A].LNCS 1397,in Information Security Workshop (ISW′97)[C].Berlin:Springer-Verlag,1998.291-312.
  • 2H Petersen,M Michels.Cryptanalysis and improvement of signcryption schemes[J].IEEProceedings-Computers and Digital Techniques.1998,145(2):149-151.
  • 3W H He,T C Wu.Cryptanalysis and improvement of Petersen-michels signcryption scheme[J].IEE Proceedings-Computers and Digital Techniques.1999,146(2):123-124.
  • 4F Bao,R H Deng.A signcryption scheme with signature directly veriable by public key[A].LNCS 1431,in PKC′98[C].Berlin:Springer-Verlag,1998.55-59.
  • 5P Horster,M Michels,H Petersen.Authenticated encryption schemes with low communication costs[J].Electronics Letters.1994,30(15):1212-1213.
  • 6Mun Kyu Lee,Dong Kyue Kim,Kunsoo Park.An authenticated encryption scheme with public verifiability[A].5th Japan-Korea Joint Workshop on Algorithms and Computation[C].Tokyo,Japan,2000.49-56.
  • 7D Yum,P Lee.New signcryption schemes based on KCDSA[A].LNCS 2288,in the 4th International Conference on Information Security and Cryptology[C].Berlin:Springer-Verlag,2001.341-354.
  • 8Jun Shin,Kwangsu Lee,Kyungah Shim.New DSA-verifiable signcryption schemes[A].LNCS 2587,Jun-BICISC 2002[C].Berlin:Heidelberg,Springer-Verlag,2003.35-47.

共引文献15

同被引文献49

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 3周瑾,张亚娟,祝跃飞.一般的基于身份签名体制与Forking引理[J].信息工程大学学报,2007,8(2):129-133. 被引量:2
  • 4SHAMIR A. Identity-based cryptosystems and signature schemes [ C ]//Advances in Cryptology-CRYPTO ' 84. Berlin : Springer-Verlag,1984:47-53.
  • 5BONEH D, FRANKLIN M. Identity-based encryption from tile Weil pairing [ C ]//Advances in Ctyptology- CRYPTO ' 01, LNCS, vol 2139. Berlin :Springer-Verlag,2001:213-229.
  • 6ZHENG Yu-liang. Digital signcryption or how to achieve cost (signa- ture & encryption) < < cost (signature) + cost ( encryption ) [ C ]//Ad- vances in Cryptology-CRYPTO' 97, LNCS, vol 1294. Berlin : Springer- Verlag, 1997 : 165-179.
  • 7MALONE-LEE J. Identity-based signcryption [ EB/OL ]. ( 2002--07- 09 ). http ://eprint. iaer. org/2002/098.
  • 8LIBERT B, QUISQUATER J. A new identity based signcryption schemes from pairings[ C ]//Proc of IEEE Information Theory Work- shop. 2003 : 155-158.
  • 9POINTCHEVAL D ,STERN J. Security arguments for digital signatures and blind signatures [ J ]. Journal of Cryptology, 2000,13 ( 3 ) : 361 - 396.
  • 10ZHENG Y L. Digital signcryption or how to achieve cost ( signature & encryption) << cost(signature) + cost(encryption) [ C]// Pro- ceedings of the CRYPTO'97, LNCS 1294. Heidelberg: Springer- Verlag, 1997:165 - 179.

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部