期刊文献+

高效的基于身份的代理签密 被引量:14

Efficient identity-based proxy signcryption
下载PDF
导出
摘要 最近Wang等人提出了一个具有前向安全和可公开验证特性的基于身份的代理签密方案,分析后发现其方案存在明显错误,这种错误直接导致其方案是行不通的。基于短签名提出了一种新的高效的具有前向安全和可公开验证特性的基于身份的代理签密方案。分析表明,新方案在保持了代理签密各种安全特性的条件下,其效率高于已有方案,更适合于在实际中应用。 Recently,Wang et al.proposed a identity-based proxy signcryption scheme with forward security and public verifiability. By analyzing,it is showed that the above scheme exists some obvious errors and so it is infeasibleJn this paper,based on short signature,a new efficient identity-based proxy signcryption scheme with forward security and public verifiability is proposed.It is showed that the proposed scheme's efficiency is better than that of some existing ones under the condition of keeping the all kinds of security characteristics of proxy signcryption,so it is more propitious to applications in society.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第3期109-111,共3页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(60372046) 华为基金资助项目(YSCB2005037NP)。
关键词 基于身份 代理签密 前向安全 可公开验证 identity-based proxy signeryption forward security public verifiability
  • 相关文献

参考文献8

  • 1Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Transactions on Fundamentals,1996,E792A (9):1338-1353.
  • 2Zheng Y.Digital signcryption or how to achieve cost(signature&encryption)《《cost(signature)+cost(encryption)[C]//Burton S K Jr.Advances in Cryptology,Crypto'97.Berlin:Springer-Verlag,1997,1294:165-179.
  • 3Shamir A.Identity-based cryptosystems and signature schemes[C]//Blakley G R,Chaum D.Advances in Cryptology,Crypto'84.Berlin:Springer-Verlag,1984,196:47-53.
  • 4Boneh D,Franklin M.Identity-based encryption from the weil pairing[C]//Kilian J.Advances in Cryptology,Crypto 2001.Berlin:Springer-Verlag,2001,2139:213-229.
  • 5Boneh D,Lynn B,Shacham H.Short signature from the weil pairing[C]//Boyd C.Advances in Cryptology,Asiacrypt 2001.Berlin:Springer-Verlag,2001,2248:514-532.
  • 6Chow S S M,Yiu S M,Hui L C K,et al.Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity[C]//Jong I L,Dong H L.Information Security and Cryptology,ICISC 2003.Berlin:Springer-Verlag,2003,2971:352-369.
  • 7Li Xiang-xue,Chen Ke-fei.Identity based proxy-signcryption scheme from pairings[C]//Zhang Liang-jie,Li Ming-lu,Amit P S,et al.Proceedings of the IEEE International Conference on Services Computing (SCC 2004).Los Alamitos,California:IEEE Computer Society Press,2004:494-497.
  • 8Wang Meng,Li Hui,Liu Zhi-jing.Efficient identity based proxysigncryption schemes with forward security and public verifiability[C]//Lu Xi-cheng,Zhao Wei.The Third International Conference on Networking and Mobile Computing (ICCNMC 2005).Berlin:Springer-Verlag,2005,3619:982-991.

同被引文献97

引证文献14

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部