期刊文献+

一种基于身份的不可传递环签密算法 被引量:2

An Identity-based Non-Transferable Ring Signcryption
原文传递
导出
摘要 在诸如匿名电子举报这类数字签名应用中,不仅需要确保被签名信息的机密性和签名者的身份模糊性,同时还需要确保签名的不可传递性。论文针对这类应用提出了一种基于身份的不可传递环签密算法,该算法通过环签密实现被签名信息的机密性和签名者身份的模糊性,并通过有机融合验证者签密伪造算法实现了签名的不可传递性。 In some applications of signature, such as anonymous e-prosecution system, the identity of the signer should be ambiguous, and the non-transferability of the signature should be guaranteed. This the paper proposes an identity based non-transferable signcryption scheme, the scheme builds up a signcyption algorithm, thus ensuring the confidentiality of the signature and the ambiguity of the signer's identity. It also designs a signcryption forging algorithm for designated verifier to guarantee the non-transferability of the scheme.
出处 《信息安全与通信保密》 2007年第9期162-164,共3页 Information Security and Communications Privacy
基金 中国科技大学青年基金(2005) 安徽省自然科学基金(No.070412045 050420211) 安徽省计算与通信软件重点实验室开放基金(2007)
关键词 环签密 身份模糊 基于身份 不可传递性 ring signcryption identity ambiguous ID-based non-transferable
  • 相关文献

参考文献1

共引文献2

同被引文献25

  • 1ZHENG Y. Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) -1-cost (encryption) [C]. In Proceedings Crypto' 97. Springer-Verlag, 1997:165-179.
  • 2LIBERT B, QUISQUATER J J. Improved signcryption from q-Diffie-Hellman problems[C]. Security Communication Networks-SCN04, LNCS. Berlin: Springer-Verlag, 2005 : 220-234.
  • 3TSO R, OKAMOTO T, OKAMOTO E. An improved signcryption Scheme and its variation[C]. Proceedings of the International Conference on Information Technology, 2007: 772-778.
  • 4MAC. Efficient short signcryption scheme with public verifiability[C]. Inscrypt'2006, LNCS4328, Berlin: Springer, 2006 : 118-129.
  • 5LI F, XIN X, HU Y. Indentity-based broadcast signeryption [J]. Computer Standards & Interfaces, 2008, 30(1) :89-94.
  • 6SHAMIR A. Identity-based cryptosystems and signature schemes[C]. Crypto' 84, Springer-Verlag. 1984:47-53.
  • 7RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret [A]. Asiacrypt'2001, LNCS 2248, Springer-Verlag, 2001 : 552-565.
  • 8HUANG X, SUSILO W, MU Y. Identity-based ring signcryption schemes: Cryptographic primitives for preserving privaey and authenticity in, the ubiquitous world[C]. Proeeedings of the AINA' 05, 2005:1-6.
  • 9ZHANG M, YANG B, ZHU S, et al. Efficient secret authenticatable anonymous signcryption scheme with identity privacy [C]. In Intelligence and Security Informaties-ISI 2008, LNCS 5075, Springer-Verlag, 2008 : 126-137.
  • 10BLAKE l, SEROUSSI G, SMART N. Advances in elliptic curve cryptography [C]. London Mathematical Society Lecture Note,Series. Cambridge: Cambridge University Press, 2005.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部