期刊文献+

一种可公开验证的基于身份的签密方案 被引量:4

An identity-based signcryption scheme with public verifiability
下载PDF
导出
摘要 签密作为一个新的密码学构件,能够在一个逻辑步骤内同时完成数字签名和公钥加密,减少了计算和通信开销。利用椭圆曲线的双线性对性质,提出了一种基于身份的签密方案,该方案提供了可由任意第三方认证密文,只有指定的接收者才能解密密文的功能,还满足了签密方案所要求的机密性、不可伪造性和不可否定性,经过分析比较,该方案具有很高的安全性和效率。 Signcryption is a new cryptographic primitive, which can sign and cncrypt message at the same time and reduce much communication and computation costs. A new efficient identity-based signcryption scheme was proposed, in which some characteristics of bilinear map were taken into account. In this scheme, anyone can identify the source of the ciphertext, but only the receiver can recover the plaintext. What's more, this scheme can satisfy the confidentiality, unforgeability and non.repudiation required by signcryption. This scheme is also very efficient regarding the computation costs and the communication overheads after analyzing and being compared with other schemes.
作者 徐吉斌 叶震
出处 《计算机应用》 CSCD 北大核心 2007年第6期1553-1555,共3页 journal of Computer Applications
关键词 签密 双线性对 可公开验证 signcryption bilinear map public verifiability
  • 相关文献

参考文献13

  • 1ZHENG Y.Disital signcryption or how to achieve cost(signature& encryption)(cost(signature) + cost(en-cryption))[A].Advances in Cryptology-CRYPTO'97[C].LNCS 1294,1997.165-179.
  • 2ZHENG Y.Signcryption and its applications in efficient public key solution[A].ISW'97,LNCS 1397[C].Springer-Verlag,1998.291-312.
  • 3SHAMIR A.Identity-based cryptosystems and signature schemes[A].Advances in Cryptology:CRYPTO' 84[C].Berlin,SpringerVerlag,1984.47-53.
  • 4BONEH D,FRANKLIN M.Identity-based encryption from the weil pairing[J].SIAM Journal of Computing,2003,32(3):586-615.
  • 5MALONE-LEE J.Identity based signcryption[EB/OL].http://eprint.iacr.org/2002/098.pdf,2006..
  • 6LIBERT B,QUISQUATER J.A new identity based signcryption schemes from pairings[A].Proceeding of the 2003 IEEE Information Theory Workshop[C].France,2003.155-158.
  • 7BOYEN X.Multipurpose identity-based signcryption:A Swissarmy knife for identity-based cryptography[A].Advances in Cryptology:CRYPTO 2003,LNCS2729[C].Berlin:Springer-Verlag,2003.383 -399.
  • 8CHOW SSM,YIU SM,HUI LCK,et al.Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity[A].Advances in Information Security and Cryptology:ICISC'03,LNCS2971[C].Berlin:SpringerVerlag.2004.352-369.
  • 9CHEN L,MALONE-LEE J.Improved identity-based signcryption[A].Advances in Public Key Cryptography:PKC 2005,LNCS3386[C].Berlin,Springer-Verlag.2005.362-379.
  • 10CHA JC,CHEON JH.An Identity-based signature from gap diffiebellman groups[A].Public Key Cryptography:PKC 2003,LNCS2567[C].Springer-Verlag,2003.18 -30.

二级参考文献15

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:104
  • 3Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179
  • 4Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81
  • 5Pang X. , Tan K. L. , Wang Y. , Ren J.. A secure agent-mediated payment protocol. In: Deng R. H. , Qing S. , Bao F. ,Zhou J. eds.. Information and Communications Security-ICICS 2002, Lecture Notes in Computer Science 2513. Berlin:Springer-Verlag, 2002, 422-433
  • 6Shamir A.. Identity-based cryptosystems and signature schemes. In: Blakley G. R. , Chaum D. eds.. Advances in Cryptology-CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984, 47-53
  • 7Boneh D. , Franklin M.. Identity-based encryption from the Weil pairing. In: Kilian J. ed.. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001, 213-229
  • 8Malone-Lee J.. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, IACR, 2002
  • 9Libert B. , Quisquater J.. A new identity based signcryption schemes from pairings. In: Proceeding of the 2003 IEEE Information Theory Workshop, Paris, France, 2003, 155-158
  • 10Nalla D., Reddy K. C.. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report2003/066, IACR, 2003

共引文献72

同被引文献34

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部