期刊文献+

基于椭圆曲线离散对数的无证书混合加密 被引量:1

Certificateless Hybrid Encryption Based on Elliptic Curve Discrete Logarithm
下载PDF
导出
摘要 基于椭圆曲线离散对数困难问题,结合KEM-DEM混合加密结构,提出一个新的无证书混合加密方案。采用椭圆曲线签名算法保证用户自主生成公钥的不可伪造性,利用用户公钥生成的会话密钥以对称加密算法加密明文,保证明文的机密性,对明文空间的大小没有严格限制。该方案主要涉及椭圆曲线上的点运算,与原有无证书加密方案中采用双线性对计算相比具有更高的执行效率。 Based on elliptic curve discrete logarithm problem and KEM-DEM hybrid encryption construction, a novel certificateless hybrid encryption scheme is proposed. Elliptic Curve Signature Algorithm(ECSA) is used to provide unforgeability of user public key. Owing to KEM-DEM construction user public key is used to generate session key and session key encapsulation. Plaintext is encrypted by symmetry encryption scheme with session key, which provides the confidentiality of plaintext without the strict limitation for plaintext message space. The main operations is point operation in elliptic curve. Compared with previous certificateless encryption schemes related to bilinear pairing operation the scheme is more efficient on computation.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第21期26-27,37,共3页 Computer Engineering
基金 国家部委基金资助项目
关键词 椭圆曲线离散对数 无证书公钥 混合加密 elliptic curve discrete logarithm certificateless public key hybrid encryption
  • 相关文献

参考文献7

  • 1Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[C]//Proc, of ASI-ACRYPT'03. [S. l.]: Springer-Verlage, 2003.
  • 2Huang Xinyi, Susilo W, Mu Yi, et al. On the Security of Certificateless Signature Schemes[C]//Proceedings of CANS'05. [S. l.]: Springer- Verlag, 2005.
  • 3Li X, Chen K, Sun L. Certificateless Signature and Proxy Signature Schemes from Bilinear Pairings[J]. Lithuanian Mathematical Journal, 2005, 45(1): 76-83.
  • 4Libert B, Quisquater J J. On Constructing Certificateless Cryptosystems from Identity Based Encryption[C]//Proc. of PKC'06.[S. l.]: Springer-Verlag, 2006.
  • 5Yum D H, Lee P J. Generic Construction of Certificateless Encryption[C]//Proc, of ICCSA'04. [S. 1.]: Springer-Verlag, 2004.
  • 6Shoup V. Using Hash Functions as a Hedge Against Chosen Ciphertext Attack[C]//Proc. of Eurocrypt'00. [S. l.]: Springer- Verlag, 2000.
  • 7Miller V. Use of Elliptic Curves in Cryptography[C]//Proc. of Crypto'85. [S. l.]: Springer-Verlag, 1985.

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部