期刊文献+

基于身份的可快速撤销代理权的代理签密方案 被引量:4

An ID-based Proxy Signcryption Scheme with Fast Revocation
下载PDF
导出
摘要 在代理签密方案中,一个被指定的代理签密人可以代表原始签密人生成有效的代理签密。然而,现有的代理签密方案都没有解决代理撤销问题,即如何收回代理签密人的签密权利。本文基于双线性对,提出了一个新的基于身份的代理签密方案,所提方案引入一个安全中介SEM,其作用是:帮助合法的代理签密人生成有效的代理签密;监督代理签密人是否按照授权证书的规定签名;检查代理签密人的签密权利是否被撤销。新方案不仅满足代理签密方案的所有安全要求,而且代理签密人只有与SEM合作才能生成有效的代理签密,使得方案具有快速撤销的功能。 Proxy signcryption schemes allow an original signcrypter to delegate his signcryption rights to a proxy signcrypter. However, the existing proxy signcryption schemes have the defect that can not solve the proxy revocation problem, that is, how to revoke the delegated signcryption rights of a proxy signcrypter. Based on the bilinear pairings, a new identity-based proxy signcryption scheme is proposed in this paper. A SEcurity Mediator (SEM) is introduced in the scheme to help a proxy signcrypter to generate valid proxy signcryptions, to examine whether a proxy signcrypter signcrypts messages according to the warrant, and to check the revocation of a proxy signcrypter. It is shown that the proposed scheme satisfies all the security requirements of a secure proxy signcryption scheme. Moreover, a proxy signcrypter must cooperate with the SEM to generate a valid proxy signcryption, which makes the new scheme has an effective and fast proxy revocation.
出处 《电子与信息学报》 EI CSCD 北大核心 2008年第3期672-675,共4页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60372046,60573043)资助课题
关键词 数字签名 代理签密 基于身份 Digital signature Proxy signcryption Identity based
  • 相关文献

参考文献12

  • 1Mambo M, Usuda K, and Okamoto E. Proxy signature: Delegation of the power to sign message[J]. IEICE Tran. on Fundam, 1996, E79-A(9): 1338-1353.
  • 2Lee B, Kim H, and Kim K. Strong proxy signature and its applications[C]. Proc of SCIS'01, Oiso, Japan, 2001: 603-608.
  • 3Zheng Y. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature)+cost (encryption)[C]. Proc of CRYPTO'97, Berlin: Springer- Verlag, 1997, LNCS 1294.: 165-179.
  • 4Gamage C, Leiwo J, and Zheng Y. Encrypted message authentication by firewalls[C]. Proc of PKC'99, Berlin: Springer-Verlag, 1999, LNCS 1560: 69-81.
  • 5陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 6Shamir A. Identity-based cryptosystems and signature schemes[C]. Proc of CRYPTO'84, Berlin: Springer-Verlag, 1984, LNCS 196: 47-53.
  • 7Boneh D and Franklin M. Identity-based encryption from the weil pairing[C]. Proc of CRYPTO 2001, Berlin: Springer- Verlag, 2001, LNCS 2139: 213-229.
  • 8Gamage C, Leiwo J, and Zheng Y. An efficient scheme for secure message transmission using proxy signcryption [C]. Proc of 22nd Australasian computer science conference, Berlin: Springer-Verlag, 1999: 420-431.
  • 9Li X and Chen K. Identity based proxy signcryption sheme from pairings[C]. Proc of the 2004 IEEE International conference on services computing, Shanghai, 2004: 494-497.
  • 10Wang Q and Cao Z F, Two proxy signcryption schemes from bilinear pairings[C]. Proc of CANS 2005, Berlin: Springer- Verlag, 2005, LNCS 3810: 161-171.

二级参考文献16

  • 1Desmedt Y.. Some recent research aspects of threshold cryptography. In: Okamoto E., Davida G., Mambo M. eds.. Information Security. Lecture Notes in Computer Science 1396. Berlin: Springer-Verlag. 1997, 158~173.
  • 2Canetti R., Gennaro R., Jarecki S., Krawczyk H., Rabin T.. Adaptive security for threshold cryptosystems. In: Wiener M.ed..Proceedings of Advances in Cryptology-CRYPTO'99. Berlin: Springer-Verlag, 1999, 98~115.
  • 3Needham R., Schroeder M.. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978, 21(12): 993~999.
  • 4Bellare M., Rogaway P.. Provably secure session key distribution--The three party case. In: Proceedings of the 27th Annual ACM Symposium on the Theory of Computing, Las Vegas, Nevada, USA, 1995, 57~66.
  • 5Naor M., Pinkas B., Reingold O.. Distributed pseudo-random functions and KDCs. In: Jacques ed.. Advances in Cryptology-Eurocrypt'99. Lecture Notes in Computer Science 1592. Berlin: Springer-Verlag, 1999, 327~346.
  • 6Daza V., Herranz J., Padro C., Saez G.. A distributed and computationally secure key distribution scheme. In: Chan A.H., Gliger V.eds.. Information Security. Lecture Notes in Computer Science 2433. Berlin: Springer, 2002, 342~356.
  • 7Zheng Y.. Digital signcryption or how to achieve cost(signature& encryption).
  • 8Zheng Y., Imai H.. Using signcryption to build compact and unforgeable key establishment over an ATM network. In: Proceedings of IEEE INFOCOM'98, San Francisco, CA, USA, 1998, 411~418.
  • 9Shamir A.. How to share a secret. Communications of the ACM, 1979, 22(11): 612~613.
  • 10Bellare M., Rogaway P.. Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, USA, 1993, 62~73.

共引文献18

同被引文献53

  • 1刘俊宝,肖国镇.带门限共享解密的多代理签密方案[J].计算机工程,2006,32(23):21-23. 被引量:4
  • 2张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 3Mambo M,Usuda K,Okamoto E.Proxy signature:Delegation of the power to sign message[J].IEICE Trans on Fundam,1996,E79-A(9):1338-1353.
  • 4Lee B,Kim H,Kim K.Strong proxy signature and its applications[C]/Proc of SCIS'01,Oisc,Japan,2001:603-608.
  • 5Shnmir A.Idenfity-based cryptosystems and signature schemes[C]//LNCS 196:Proc of CRYPTO'84.Berlin,Germany:Springer-Verlag,1984:47-53.
  • 6Zheng Y.Digital signcryption or how to achieve cost(signature & eneryption) 《《cost (signature) +cost (encryption)[C]//LNCS 1294:Proc of Advances in Cryptology Crypt'97.Berlin:Springer-Verlag,1997:165-179.
  • 7Gamage C,Leiwo J,Zheng Y.An efficient scheme for secure message transmission using proxy signcryption[C]//Proc of 22nd Australasian Computer Science Conference.Berlin:Springer-Verlag,1999:420-431.
  • 8Liu Jun-bao,Xiao Guo-zhen.Multi-proxy multi-signcryption scheme from pairings[EB/OL].http://arxiv.org/ftp/cs/papers/0509/05Og030.pdf.
  • 9Lal S,Singh T.New id-bascd multi-proxy multi-signeryption scheme from pairings[EB/OL].http://arxiv.org/ftp/cs/pepers/0701/0701044.pdf.
  • 10于刚,黄根勋,石雅男,等.-个前向安全的基于身份的多代理多签密方案[C]//密码学进展-China Crypt'2007.成都:西南交通大学出版社,2007:178-183.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部