期刊文献+

ECDSA可公开验证广义签密 被引量:29

New ECDSA-Verifiable Generalized Signcryption
下载PDF
导出
摘要 签密是一种能够同时提供加密和认证功能的密码体制.该文首次将签密的应用范围推广到仅需要机密性或完整性的场合,提出了广义签密的定义.广义签密不仅具有一般签密的属性,针对特定的输入还可提供单独的加密或签名功能.基于椭圆曲线数字签名标准ECDSA,文中提出一个广义签密方案SC-ECDSA,无特定验证方时等价于ECDSA签名,无特定发送方时等价于AtE(OTP$,MAC)结构加密,第三方可在ECDSA的模式下公开验证.在Random Oracle模型上证明了该方案的安全性:CUF-CPA的机密性、与ECDSA同等的不可伪造性和不可否认性.效率分析表明,在适当的安全参数下SC-ECDSA的计算量比目前最快的SCS签密降低了78%. Signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of signature and encryption. The definition of generalized signcryption is proposed in the paper firstly. Generalized signcryption has a special feature that provides confidentiality or authentici ty separately under specific inputs. So it is more useful than common ones. Based on ECDSA, a signcryption scheme called SC ECDSA is designed. It will be equivalent to an AtE(OTPs, MAC) encryption scheme or ECDSA when one of party is absent. A third party can verify the signcryption text publicly in the method of ECDSA. Security properties are proven based on Random Ora cle mode: Confidentiality(CUF-CPA), unforgeability(UF-CMA) and non-repudiation. For typical security parameters for high level security applications, compared with the others, SC ECDSA presents a 78% reduction in computational cost.
出处 《计算机学报》 EI CSCD 北大核心 2006年第11期2003-2012,共10页 Chinese Journal of Computers
基金 国家自然科学基金(60473029)资助.
关键词 签密 广义签密 数字签名 认证加密 椭圆曲线数字签名算法 signcryption generalized signcryption digital signature authenticated encryption ECDSA
  • 相关文献

参考文献22

  • 1Krawczyk H..The order of encryption and authentication for protecting communications(or:How secure is SSL?).In:Kilian J.ed..Proceedings of Advances in Cryptoloty-CRYPTO2001.Lecture Notes in Computer Science 2139.Berlin:Springer-Verlag,2001,310~331
  • 2Zheng Y..Digital signcryption or how to achieve cost(signature &encryption)《《cost(signature)+cost(encryption).In:Kaliski B.S.ed..Proceedings of Advances in Cryptoloty-CRYPTO'97.Lecture Notes in Computer Science 1294.Berlin:Springer-Verlag,1997,165~179
  • 3Bao F.,Deng R.H..A signcryption scheme with signature directly verifiable by public key.In:Imai H.,Zheng Y.ed..Proceedings of the Public Key Cryptography'98,Lecture Notes in Computer Science 1431,Berlin:Springer-Verlag,1998,55~59
  • 4Yum D.H.,Lee P.J..New Signcryption Schemes based on KCDSA.In:Proceedings of the 4th International Conference on Information Security and Cryptology,Seoul,Korea,2002,305~317
  • 5Shin J.B.,Lee K.,Shim K..New DSA-verifiable signcryption schemes.In:Proceedings of the 5th International Conference on Information Security and Cryptology,Seoul,Korea,2003,35~47
  • 6Malone-Lee J.,Mao W..Two birds one stone:Signcryption using RSA.In:Joye M.ed..Proceedings of the Topics in Cryptology-Cryptographers'Track,RSA Conference 2003.Lecture Notes in Computer Science 2612.Berlin:Springer-Verlag,2003,210~224
  • 7Boyen X..Multipurpose identity-based signcryption:A swiss army knife for identity-based cryptography.In:Proceedings of Advances in Cryptology-Crypto'03.Lecture Notes in Computer Science 2729.Berlin:Springer-Verlag,2003,382~398
  • 8Libert B.,Quisquater J..Efficient signcryption with key privacy form gap Diffie-Hellman group.In:Bao Feng ed..Proceedings of the Public Key Cryptography-PKC'04.Lecture Notes in Computer Science 2947.Berlin:Springer-Verlag,2004,187~200
  • 9Zheng Y.,Imai H..How to construct efficient signcryption schemes on elliptic curves.Information Processing Letters,1998,68(5):227~233
  • 10Bellare M.,Namprempre C.,Authenticated encryption:Relations among notions and analysis of the generic composition paradigm.In:Okamoto T.ed..Proceedings of Advances in Cryptology-ASIACRYPT2000.Lecture Notes in Computer Science 1976.Berlin:Springer-Verlag,2000,531~545

同被引文献213

引证文献29

二级引证文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部