期刊文献+

基于无证书公钥密码体制的身份鉴别方案 被引量:1

An Identification Scheme Based on Certificateless Public-Key Cryptosystem
下载PDF
导出
摘要 基于双线性加群G1上计算Diffie-Hellman问题的困难性假设下,采用无证书公钥密码体制密钥生成原理,首次提出了一个能有效抵抗重置攻击和冒充攻击的基于ID的身份鉴别方案,避免了基于身份的诸多方案所涉及敏感的密钥托管问题.最后在随机预言模型下给出了方案的安全性证明. Based on the hardness assumption of Computational Diffie-Hellman problem(CDHP) in a bilinear additive group, an ID-based identification scheme is proposed. The new ID-based identification scheme can with- stand the reset attacks and impersonation attacks, and avoid the key escrow problem of many ID-based schemes by using secret key generation technique of the certificateless public key cryptosystem. Finally, security proofs of the proposed identification scheme are given under the random oracle model.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2008年第5期619-622,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金(60473072) 陕西省自然科学基础研究计划项目(2007A06)
关键词 随机预言模型 重置攻击 冒充攻击 无证书公钥密码体制 random oracle model reset attack impersonation attack eertificateless public key cryptosystem (CL-PKC)
  • 相关文献

参考文献9

  • 1Guillou L S, Quisquater J J. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessors Minimizing both Transmission and Memory [DB/OL]. [2007-12-20]. http://portal, acre. org/citation, c fro? id= 55554. 55565.
  • 2Schnorr C P. Efficient Identification and Signatures for Smart Cards [DB/OL]. [ 2008-01-04]. http://www. springerlink, com/content/ plSlaecaleg98mtyd/.
  • 3胡国政,洪帆.无需随机预言可证安全的基于ID的身份认证方案[J].武汉理工大学学报(信息与管理工程版),2007,29(2):66-69. 被引量:4
  • 4胡国政,洪帆,郭亚军.标准模型中可证安全的基于ID的身份认证方案[J].小型微型计算机系统,2007,28(11):2015-2019. 被引量:3
  • 5Benoit L, Quisquater J J. On Constructing Certificateless Cryptosystems from Identity Based Encryption [DB/OL]. [2008-01-04]. http://www. springerlink. com/content/cr781782271588350/.
  • 6Zhang Z F, Wong D S, Xu J, et al. Certificateless Public-Key Signature: Security Model and Efficient Construction[C]/ / Fourth International Conference on Applied Cryptography and Network Security (LNCS 3989). Berlin: Springer-Verlag, 2006: 293-308.
  • 7Bellare M, Palacioy A. GQ and Schnorr Identification Schemes: Proofs of Security Against Impersonation Under Active and Concurrent Attacks [DB/OL]. [2007-12-04]. http://www, springerlink, com/con- tent/m5qbcxykarlcbr28/.
  • 8Bellare M, Namprempre C, Neven G. Security Proofs for Identity-Based Identification and Signature Schemes [DB/OL]. [2008-01-22]. http://www, springerm link. com/content/ pOO f8tvcw33wyxm9 /.
  • 9Mao Wenbo. Modern Cryptography: Theory and Practice[M]. Indianapolis : Prentice Hall, 2003 : 75-78.

二级参考文献12

  • 1FIAT A,SHAMIR A.How to prove yourself:practical solutions to identification and signature problems[C].Advances in Cryptology-CRYPTO'86.Berlin:Springer-Verlag,1987:186-194.
  • 2KUROSAWA K,HENG S H.From digital signature to ID-based identification/signature[C].Public Key Cryptography-PKC'04.Berlin:Springer-Verlag,2004:248-261.
  • 3BELLARE M,NAMPREMPRE C,NEVEN G.Security proofs for identity-based identification and signature schemes[C].Advances in Cryptology-EUROCRYPT'04.Berlin:Springer-Verlag,2004:268-286.
  • 4BONEH D,BOYEN X.Short signatures without random oracles[C].Advances in Cryptology-EUROCRYPT '04.Berlin:Springer-Verlag,2004:56-73.
  • 5BELLARE M,PALACIO A.GQ and schnorr identification schemes:proofs of security against impersonation under active and concurrent attacks[C].Advances in Cryptology -CRYPTO '02.Berlin:Springer-Verlag,2002:162-177.
  • 6Fist A,Shamir A.How to prove yourself:practical solutions to identification and signature problems[C].In:Odlyzko A ed.Advances in Cryptology -CRYPTO'86.Berlin:Springer-Verlag,1987,186-194.
  • 7Kurosawa K,Heng S H.From digital signature to ID-based identification/signature[A].In:Bao F,Deng R,J Zhou eds.Public Key Cryptography-PKC'04[C].Berlin:Springer-Verlag,2004,248-261.
  • 8Bellare M,Namprempre C,Neven G.Security proofs for identity-based identification and signature schemes[A].In:C Cachin,J Camenisch eds.Advances in Cryptology-EUROCRYPT'04[C].Berlin:Springer-Verlag,2004,268-286.
  • 9Boneh D,Boyen X.Short signatures without random oracles[A].In:Cachin C,Camenisch J eds.Advances in CryptologyEUROCRYPT'04[C].Berlin:Springer-Verlag,2004,56-73.
  • 10Feige U,Fiat A,Shamir A.Zero-knowledge proofs of identity[J].Journal of Cryptology.Berlin:Springer-Verlag,1988,1(5):77-94.

共引文献4

同被引文献6

  • 1胡国政,洪帆.无需随机预言可证安全的基于ID的身份认证方案[J].武汉理工大学学报(信息与管理工程版),2007,29(2):66-69. 被引量:4
  • 2Fiat A,Shamir A.How to Prove Yourself:Practical Solutions to ldengtification and Signature Problema[C]//Proc.of CryptologyCRYPTO'86.Berlin,Germany:Springer-Verlag,1987:186-194.
  • 3Guillou L S,Quisquater J J.A Practical Zero-knowledge Protocol Fitted toSecurity MinimizingBoth Transmission and Memory[DB/OL].(2007-12-20).http://portal.acm.org/citation.cfm?id=55554.55565.
  • 4Schnorr C P.Efficient Identification and Signatures for Smart Cards[DB/OL].(2008-01-04).http://www.springerlink.com/content/p151aecakg98mtyd.
  • 5Bellarem D,Boyen A.GQ and Schnorr Idcntification Schemes Proofs of Security Against Impersonation Under Active and Concurrent Attacks[C]//Proc.of Cryptology-CRYPTO'02.Berlin,Germany:Springer-Verlag,2002:162-177.
  • 6白建东,孙志刚.基于Bloom Filter的报文分类算法[J].计算机工程,2009,35(5):108-110. 被引量:4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部