期刊文献+

基于Hess签名的公开可验证签密方案 被引量:6

Public Verifiability Signcryption Scheme Based on Hess’s Signature
下载PDF
导出
摘要 利用Hess基于身份的数字签名方案,提出了一个基于身份的公开可验证加密签名方案。在BDH问题是困难的假设下,运用随机预言模型证明了该方案的安全性。方案在拥有基于身份密码体制独特优点的同时,又能保证在不访问明文的情况下,任何第三方都可以认证密文。证明了方案具有前向安全性,即使签名者的私钥泄漏,第三方也不能恢复所签密消息的明文。新方案仅需2次双线性对运算,比目前效率最高的Chen和Malone-Lee方案少1次。 Utilizing Hess's identity-based signature scheme, this paper proposes a public verifiability signcryption scheme. In the random oracle model, the proposed scheme is proved to be secure assuming the bilinear Diffle-Hellman problem is hard. As the authentication and recovery are separated in this scheme, anyone can identify the source of the ciphertext without the plaintext. What's more, the proposed scheme has forward security. Even if the secret key is compromised, the attackers can not recover the signcryption of the past time. As compared with the most efficient Chen & Malone-Lee scheme to date, the proposed scheme decreases one pairing operation and only requires two pairing operations.
作者 余昭平 康斌
出处 《计算机工程》 CAS CSCD 北大核心 2008年第3期199-201,219,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60503012) 现代通信国家重点实验室基金资助项目(51436020405JB5205)
关键词 基于身份 可验证的加密签名 双线性对 随机预言模型 可证明安全性 ID-based verifiably encrypted signature bilinear pairing random oracle model provable security
  • 相关文献

参考文献9

  • 1Zheng Y. Digital Signcryption or How to Achieve Cost(Signature& Encryption << Cost (Signature) + Cost (Encryption)[C]//Advances in Cryptology-CRYPTO'97, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1997: 165-179.
  • 2Shamir A. Identity-based Cryptosystems and Signature Schemes[C]// Advances in Cryptology-CRYPTO 84, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1984: 47-53.
  • 3Boneh D, Franklin M. Identity-based Encryption from the Weil Pairing[C]//Advances in Cryptology-CRYPTO'2001, Lecture Notes in Computer Science. Berlin: Springer-Vedag, 2001:213-229.
  • 4Malone-Lee J. Identity Based Signcryption[R]. Cryptology ePrint Archive, Report: 2002/098, IACR, 2002.
  • 5Libert B, Quisquater J. A New Identity Based Signcryption Schemes from Pairings[C]//Proceedings of the IEEE Information Theory Workshop. Paris, France: [s. n.], 2003: 155-158.
  • 6Chow S S M, Yiu S M, Hui L C K, et al. Efficient Forward and Provably Secure ID-based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity[C]//Advances in Information Security and Cryptology-ICISC'03, Lecture Notes in Computer Science. Berlin: Springer-Vedag, 2004: 352-369.
  • 7Chen L, Malone-Lee J. Improved Identity-based Signcryption[C]// Advances in Public Key Cryptography-PKC2005, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2005: 362-379.
  • 8Hess E Efficient Identity Based Signature Schemes Based on Palrings[C]//Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography. Berlin: Springer-Verlag, 2003: 310-324.
  • 9李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73

二级参考文献15

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:104
  • 3Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179
  • 4Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81
  • 5Pang X. , Tan K. L. , Wang Y. , Ren J.. A secure agent-mediated payment protocol. In: Deng R. H. , Qing S. , Bao F. ,Zhou J. eds.. Information and Communications Security-ICICS 2002, Lecture Notes in Computer Science 2513. Berlin:Springer-Verlag, 2002, 422-433
  • 6Shamir A.. Identity-based cryptosystems and signature schemes. In: Blakley G. R. , Chaum D. eds.. Advances in Cryptology-CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984, 47-53
  • 7Boneh D. , Franklin M.. Identity-based encryption from the Weil pairing. In: Kilian J. ed.. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001, 213-229
  • 8Malone-Lee J.. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, IACR, 2002
  • 9Libert B. , Quisquater J.. A new identity based signcryption schemes from pairings. In: Proceeding of the 2003 IEEE Information Theory Workshop, Paris, France, 2003, 155-158
  • 10Nalla D., Reddy K. C.. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report2003/066, IACR, 2003

共引文献72

同被引文献42

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部