期刊文献+

基于身份签密的身份认证模型 被引量:3

Authentication scheme using identity-based signcryption
下载PDF
导出
摘要 身份认证方案是实现访问控制的重要工具。结合基于身份的签密思想和零知识协议,给出了一个身份认证方案模型,该模型可以实现通信双方的互认证,且可被任何一个基于身份的签密方案实例化。给出的实例化是以现存比较高效的一个基于身份的签密方案进行的。分析了实例化后方案的安全性,结果表明它可以避免重放攻击、伪造攻击、中间人攻击等常见攻击,且该方案可以容易地扩展为一个可认证的密钥协商方案。 Authentication schemes are important tools fmishing access control. By combining the idea of identity-based signcryption and zero-knowledge protocol, a model for authentication scheme is presented. The model can reach the two parties' mutual authentication in the communication and is instantiated by any identity-based signcryption scheme. The instantiation appeared is actualized by an existing effective identity-based signcryption. The result of analyzing the instantiated scheme shows that it is secure against some familiar attacks such as replay attacks, forgery attacks, man-in-the-middle attacks and it is easily advanced to an authenticated key agreement scheme.
作者 徐述
出处 《计算机工程与设计》 CSCD 北大核心 2008年第24期6269-6270,6284,共3页 Computer Engineering and Design
关键词 零知识 身份认证 签密 基于身份 双线性对 zero-knowledge authentication signcryption identity-based bilinearpairing
  • 相关文献

参考文献8

  • 1Shamir A.Identity-based cryptosystems and signature schemes[C]. Advances in Cryptology-Crypto'84.Springer-Verlag,1984:47-53.
  • 2Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C].Advances in Cryptology-Crypto'2001.Springer-Verlag, 2001:213-229.
  • 3Waters B.Efficient identity-based encryption without random oracles [C]. Advances in Cryptology-EUROCRYPT 2005. Berlin: Springer-Verlag,2005:114-127.
  • 4Cheng X, Liu J, Wang X. An identity-based signature and its threshold version[C]. 19th International Conference on Advanced Information Networking and Applications-AINA,2005:973-977.
  • 5Barreto PSLM,Libert B,McCullagh N,et al.Efficient and prova- bly-secure identity-based signatures and signeryption from bilinear maps[C].Advances in Cryptology-ASIACRYPT 2005.Berlin:Springer-Verlag,2005:515-532.
  • 6Zheng Y.Digital signcryption or how to achieve cost(signature and encryption)<<cost (signature)+cost (encryption) [C]. Advances in Cryptology-CRYPTO'97.Berlin: Springer-Verlag, 1997:165-179.
  • 7Menezes A J.Handbook of applied cryptography[M].胡磊,译. 北京:电子工业出版社,2005.
  • 8李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73

二级参考文献15

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 3Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179
  • 4Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81
  • 5Pang X. , Tan K. L. , Wang Y. , Ren J.. A secure agent-mediated payment protocol. In: Deng R. H. , Qing S. , Bao F. ,Zhou J. eds.. Information and Communications Security-ICICS 2002, Lecture Notes in Computer Science 2513. Berlin:Springer-Verlag, 2002, 422-433
  • 6Shamir A.. Identity-based cryptosystems and signature schemes. In: Blakley G. R. , Chaum D. eds.. Advances in Cryptology-CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984, 47-53
  • 7Boneh D. , Franklin M.. Identity-based encryption from the Weil pairing. In: Kilian J. ed.. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001, 213-229
  • 8Malone-Lee J.. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, IACR, 2002
  • 9Libert B. , Quisquater J.. A new identity based signcryption schemes from pairings. In: Proceeding of the 2003 IEEE Information Theory Workshop, Paris, France, 2003, 155-158
  • 10Nalla D., Reddy K. C.. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report2003/066, IACR, 2003

共引文献72

同被引文献18

  • 1张胜,徐国爱,胡正名,杨义先.Ad hoc网络信任模型的研究[J].计算机应用研究,2005,22(12):100-102. 被引量:6
  • 2Ruppel, R.A., Analysis and Design of Stream Ciphers, Springer-Verleg, 1986.
  • 3Juets, Watternberg. A Fuzzy Commitment Scheme[A]. In Proc. ACM. Computer and Communication Security[C]. 1999:28-36.
  • 4Dodis. Y, Reyzin. L,A.Smith. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and other NoisyData[J]. Proceedings of Advances in Cryptogrphy-Eurocrypt2004:523-540.
  • 5Burner A, Dowling T. A Biometric Identity Based Signature Scheme[Z],(2007--12-06). http://ieeexpore, ee.org/xpl/ free&bs--all, jsp?Arnumber- 4226104.
  • 69enoit Libert, J.Quisqu&ter,A new identity based signcryption scheme from pairings, http://citeseerx.ist.psu.edu/viewdoc/downl oad?doi=10.1. 1. 75.8 745&rep=rep ) &type=pdf.
  • 7D.Boneh and M.Franklin. Identity Based Encryption from the Well Pairing. SlAM Journat of Computing, Vot. 52, No. 3, pages 586-615, 2001.
  • 8Li, XiMing Yang, Bo, Zhang, MingWu. New construction of fuzzy identity-based encryption. 2009 WASE International Conference on information Engineering, ICIE 2009.
  • 9A Sahai, B Waters. Fuzzy identity-based encryption, Advances in CryptoIogy-EUROCRYPT 2005 Springer Vet--lag Press,2005,LNCS 3494: 457--473.
  • 10Piyi Yang, Zhenfu Cao and Xiaolei Dong. Abstract Fuzzy Identity Based Signature. http:// rnirror.crypto /eprint.iacr. org/2008/002.pdf.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部