期刊文献+

一种公开验证和前向安全的签密方案 被引量:1

A signcryption scheme with public verifiability and forward security
下载PDF
导出
摘要 利用椭圆曲线上双线性映射的特性,提出了一种基于身份的签密方案。分析结果表明,该方案除了满足一般签密方案的安全性外,还满足公开验证性和前向安全性。当发送方与接收方发生争议时,任何第3方都可以验证签名的有效性,但只有指定的接收者才可以解密恢复出消息明文。 A new ID-based signcryption scheme is proposed based on the characteristics of bilinear map on elliptic curve. The analysis result shows that this scheme not only has the properties of the common signcryption scheme, but also satisfies the public verifiability and forward security. When two parties in the communication crash with each other, any third one can verify the validity of the signature, but only the receiver can recover the plaintext.
出处 《重庆邮电大学学报(自然科学版)》 2008年第6期763-765,共3页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 重庆市教委科学技术研究(KJ060510)
关键词 双线性映射 签密 公开验证 前向安全 bilinear map signcryption public verifiability forward security
  • 相关文献

参考文献8

  • 1[1]ZHENG Yulang.Digital Signcryption or How to Achieve Cost(Signature and Eneryption)[M]//Advances in Cryptography:Proceedings of CRYPTO'97,LNCS 1294.[s.n.]:Springer-Verlag,1997,165-179.
  • 2[2]SHAMIR A.Identity-based cryptosystems and signature schemes[M]// Advances in Cryptology-CRYPTO'84:Lecture Notes in Computer Science 196.[s.n.]:Springer-Verlag,1984:47-53.
  • 3[3]BONEH D,FRANKLIN M.Identity-based encryption from the Weil pairing[M]// Advances in Cryptology-CRYPTO 2001:Lecture Notes in Computer Science 2139.[s.n.]:Springer-Verlag,2001,213-229.
  • 4[4]MALONE-Lee J.Identity based signcryption[EB/OL].[2007-02-22].http://citeseer.ist.psu.edu/malone-lee02identitybased.html.
  • 5[5]NALLA D,REDDY K C.Signcryption scheme for identity-based cryptosystems[EB/OL].[2007-02-22].http://citeseer.ist.psu.edu/566354.html.
  • 6[6]LIBERT B,QUISQUATER J.A new identity based signcryption schemes from pairings[EB/OL].[2007-02-22].http://eprint.iacr.org/2003/023.pdf.
  • 7李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 8耿莉,王尚平,周峰,燕召将.一种新的基于身份的签密方案[J].计算机工程,2004,30(19):52-54. 被引量:9

二级参考文献24

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 3Shamir A. Identity-based Cryptosystems and Signature Schemes. In Advance in Cryptology-crypto, 2002
  • 4Boneh D, Franklin M. Identity-based Encryption from the Weil Pairing.In Proc. Crypto LNCS, 2001,2139:213-229
  • 5Miyaji A. A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves. In Kim K, and Matsumoto T, editors, Proceedings of Asiacrypt'96, Numbe.r 1163 in Lecture Notes in Computer Science, Springer-verlag, 1996:1-14
  • 6Maurer U, Yacobi Y Non-interactive Public-key Cryptography. In Advances in Cryptology Crypto 91, Lecture Notes in Computer Science, Springer-verlag, 1991,547:498-507
  • 7Joux A, Nguyen K. Separating Decision Diffie-hellman from Diffiebellman in Cryptographic Groups. Cryptology ePrint Archive Report2001/003, Available from http://eprint. iacr.org/,2001
  • 8Desmedt Y, Quisquater J. Public-key Systems Based on the Difficulty of Tampering. In Advances in Cryptology Crypto 86, Lecture Notes in Computer Scince, Springer-verlag, 1986,263 : 111-117
  • 9Tsuji S, Itoh T. An ID-bases Cryptosystem Based on the Discrete Logarithm Problem. iEEE Journal on Selected Areas in Communication,1989,7(4): 467-473
  • 10Tanaka H. A Realization Scheme for the Identity-based Cryptosystem.In Advances in Cryptology-crypto 87, Lecture Notes in Computer Sc ience, Springer-vedag, 1987,293:341-349

共引文献79

同被引文献15

  • 1罗永,成礼智,吴翊,徐志宏.基于模糊关系的DEM数据信息伪装技术研究[J].模糊系统与数学,2004,18(3):116-120. 被引量:10
  • 2张雷,平西建,张涛.一阶统计特征保持的图像信息伪装算法[J].计算机辅助设计与图形学学报,2005,17(1):99-104. 被引量:4
  • 3徐胜波,武传坤,王新梅.移动通信网中的认证与密钥分配[J].电子学报,1996,24(10):107-110. 被引量:9
  • 4谭利平,李方伟.移动通信系统中的认证与密钥协商协议[J].计算机应用,2007,27(6):1343-1344. 被引量:5
  • 5BROWN D. Techniques for privacy and authentication in personal communication systems [ J ]. IEEE Personal Commmunications, 1995,8 : 6-10.
  • 6杨尚英 朱虹 李永盛.一种数字图像的信息伪装技术.信息隐藏,2001,:170-174.
  • 7CELIK M U, SHARMA G, TEKALP AM,et al. Lossless Watermarking for Image Authentication: A New Framework and an Implementation [ J ]. IEEE Transactions on Image Processing ,2006,15 ( 4 ) : 1042-1049.
  • 8HELLER M J,CHANG L F, YACOBI Y. Privacy and authentication on a portable communications system [ EB/ OL]. [ 2009-07-15 ]. http://ieeexplore. ieee. org/search/ srchabstract. jsp? tp = &amumber = 188696&queryText% 3Dprivacy + and + authentication + on + a + portable + communications + system% 26openedRefinements% 3D * % 26searchField% 3DSearch + All.
  • 9MU Y, VARADHARAJAN V. On the design of security protodol for mobile communications [ EB/OL]. [ 2009-07- 15 ]. http://www. springerlink. com/content/ 5183m5520025w6311.
  • 10DENNING D E, SACCO G M. Timestamps in key distribution protocols [ EB/OL ]. [ 2009-07-15 ]. http ://faculty. nps. edu/dedennin/publications/TimestampsKeyDistribution. pdf.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部