期刊文献+

一个高效的基于身份的代理签密方案 被引量:6

Efficient ID-based Proxy Signcryption Scheme
下载PDF
导出
摘要 代理签密使原始签密者可以将其签密权力委托给代理签密者,从而代表原始签密者签密指定的消息。该文应用双线性对提出一个基于身份的代理签密方案。理论分析表明,在BDH问题和DBDH问题是困难的假设下,该方案是安全的,与现有的典型方案相比,其具有更高的实现效率,更适合实际应用。 Proxy signcryption is useful when an original signcrypter needs to delegate his or her signcrypting capability to a proxy signcrypter, and the proxy signcrypter can signcrypt messages on behalf of the original signcrypter. This paper proposes an identity-based proxy signcryption scheme from bilinear pairings. Analysis shows that the scheme is secure, assuming that BDH problem and DBDH problem are hard. It satisfies all the security that a strong proxy signcryption scheme requires. Compared with other schemes, the scheme is proved more efficient and suitable for many applications.
作者 杨萱 余昭平
出处 《计算机工程》 CAS CSCD 北大核心 2009年第2期170-171,183,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60503012) 现代通信国家重点实验室基金资助项目(9140C1102060702)
关键词 代理签密 基于身份的密码体制 双线性对 proxy signcryption ID-based cryptography bilinear pairings
  • 相关文献

参考文献8

  • 1Shamir A. Identity-based Cryptosystems and Signature Schemes[C]// Proc. of CRYPTO'84. Berlin, Germany: Springer-Verlag, 1984.
  • 2Boneh D, Franklin M. Identity-based Encryption from the WeilPairing[C]//Proc. of CRYPTO'01. Berlin, Germany: Springer- Verlag, 2001.
  • 3Mambo M, Usuda K, Okamoto E. Proxy Signatures: Delegation of the Power to Sign Messages[J]. IEICE Trans. on Fundam, 1996, E79-A(9): 1338-1354.
  • 4Lee B, Kim H, Kim K. Strong Proxy Signature and Its Application[C]//Proceedings of SCIS'01. Oiso, Japan: [s. n.], 2001.
  • 5Gamage C, Leiwo J, Zheng Yuliang. An Efficient Scheme for Secure Message Transmission Using Proxy-signcryption[C]//Proc. of the 22th Australasian Computer Science. [S. l.]: Springer-Verlag, 1999.
  • 6Li Xiangxue, Chen Kefei. Identity-based Proxy-signcryption Scheme from Pairings[C]//Proceedings of SCC'04. Los Alamitos, USA: IEEE Computer Society Press, 2004: 494-497.
  • 7Wang Meng, Li Hui, Liu Zhijing. Efficient Identity-based Proxysigncryption Schemes with Forward Security and Public Verifiability[C]//Proc. of the 3rd International Conference on Networking and Mobile Computing. [S. l.]: Springer-Verlag, 2005.
  • 8Duan Shanshan, Cao Zhenfu, Zhou Yuan. Secure Delegation-by- warrant ID-based Proxy Signcryption Scheme[C]//Proc. of CIS'05. [S.l.]: Springer-Verlag, 2005.

同被引文献54

  • 1段姗姗,曹珍富,陆荣幸.基于身份的强壮门限签密方案[J].上海交通大学学报,2005,39(12):1946-1949. 被引量:6
  • 2张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 3周瑾,张亚娟,祝跃飞.一般的基于身份签名体制与Forking引理[J].信息工程大学学报,2007,8(2):129-133. 被引量:2
  • 4Zheng Yuliang. Digital Signcryption or How to Achieve Cost (Signature and Encryption) Cost(Signature)+Cost(Encryption)[C]// Proc. of Advances in Cryptology-Crypto’97. [S. 1.]: Springer- Verlag, 1997: 165-179.
  • 5Gamage C, Zheng Yuliang. An Efficient Scheme for Secure Message Transmission Using Proxy-signcryption[C]//Proc. of the 22nd Australasian Computer Science Conference. New York, USA: Springer-Verlag, 1999: 420-431.
  • 6Wang Qin, Cao Zhenfu. Two Proxy Signcryption Schemes from Bilinear Pairings[C]//Proc. of International Conference on Cryptology and Network Security. [S. 1.]: Springer-Verlag, 2005: 161-171.
  • 7Li Xiangxue, Chen Kefei. Identity Based Proxy-signcryption Scheme from Pairings[C]//Proc. of 2004 IEEE International Conference on Services Computing. [S. 1.]: IEEE Computer Society, 2004: 494-497.
  • 8Zhang Fangguo, Kim K. Efficient ID-based Blind Signature and Proxy Signature from Bilinear Pairings[C]//Proc. of Conference on Information Security and Privacy. New York, USA: Springer- Verlag, 2003: 312-323.
  • 9Hess F. Efficient Identity Based Signature Schemes Based on Pairings[C]//Proc. of the 9th Annual International Workshop on Selected Areas in Cryptography. London, UK: Springer-Verlag, 2003: 310-324.
  • 10Shair A. Identity-based cryptosystems and signature schemes [ C ]//Advances in Cryptology : crypto' 84. Berlin : springer, 1984 : 47-53.

引证文献6

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部