期刊文献+

一种新的有效签密方案的研究 被引量:4

New Efficient Signcryption Scheme
下载PDF
导出
摘要 签密是一种将数字签名和加密结合的技术,在移动电子商务等场合有很好的应用前景,目前基于身份的签密方案的研究一直是一个难点。针对这种情况,提出了一个新的利用双线性对构建的基于身份的签密方案,此方案将身份信息引入签名密钥,并将消息融入签名信息,而且签名的验证和消息的恢复可以分别独立进行。方案可以应用于为移动设备过滤垃圾信息等移动电子商务场合。 Signcryption combines digital signature and encryption, but the research about the efficient Identity based signcryption schemes is difficuh. For this, an efficient ID-based signcryption scheme which uses bilinear pairings is proposed. In the scheme, identity message is imported into signature key, and signature contains message. As the scheme can separate the signature verification from message recovery, it can be applied in mobile E-business scenario, such as filtration of bad instant messages of mobile equipment.
出处 《南京理工大学学报》 EI CAS CSCD 北大核心 2006年第6期739-741,754,共4页 Journal of Nanjing University of Science and Technology
关键词 基于身份的密码 签密 双线性对 ID-based cryptography signcryption bilinear pairings
  • 相关文献

参考文献11

  • 1[1]Shamir A.Identity-based cryptosystems and signature schemes[A].Advances in Crytology-Crypto ' 84,LNCS 196[C].Berlin:Springer-Verlag,1984,47-53.
  • 2[2]Cha J C,Cheon J H.An identity-based signature from gap diffie-hellman groups[A].Public Key Cryptography-PKC'2003 (LNCS 2567)[C].Berlin:SpringerVerlag,2003.18-30.
  • 3[3]Boneh D,Lynn B,Shacham H.Short signatures from the weil pairing[A].Proc Advances in CryptologyAsiacrypt 2001[C].Gold Coast,Queensland,Australia:[s.n.],2001.514-532.
  • 4[4]Cha J C,Cheon J H.An Identity-based signature from Gap Diffie-Hellman groups[EB/OL].http://eprint.iacr.org/2002/0184,2002 -02-15.
  • 5[5]Paterson K G.ID-based signatures from pairings on elliptic curves[J].Electron Lett,2002,38 (18):1 025-1 026.
  • 6[6]Hess F.Efficient identity based signature schemes based on pairings[A].Advances in Cryptology-Asiacrypt'2001,LNCS 2595[C].Berlin:Springer-Verlag,2003.310-324.
  • 7[7]Zheng Y.Digital signcryption or how to achieve cost(signature & encryption) 《cost (signautre)-+ -cost(encryption)[A].Advance in Cryptology CRTPTO97 (LNCS1294)[C].Germany:Springer-Verlag,1997.165-179.
  • 8[8]Zheng Y,Imai H.Efficient signcryption schemes on elliptic curves[J].Inform Process Letters,1998,68(6):227 -233.
  • 9[9]Lee J M.Signcryption with Non-Repudiation[R].Bristol:Department of Computer Science,University of Bristol,2002.
  • 10[10]Malone-Lee J.Identity based signcryption[EB/OL].http://eprint.iacr.org/2002/098,2002-07-19.

同被引文献29

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部