期刊文献+

基于身份的高效签密密钥封装方案 被引量:4

An ID-Based Efficient Signcryption Key Encapsulation Scheme
下载PDF
导出
摘要 KEM-DEM结构的混合密码体制是获得IND-CCA安全最实际有效的方法,传统的KEM由公钥加密方案实现,仅提供DEM使用的会话密钥的保密性安全.2005年Alexander等人将签密的概念与KEM-DEM结构的混合密码体制相结合,提出了Signcryption KEM-DEM结构的混合签密.其中Signcryption KEM是利用发送者私钥和接收者公钥共同生成会话密钥及其密钥封装.该方法可以使密钥封装同时具有保密安全性和不可伪造安全性.在基于身份密码体制上扩展了签密密钥封装的定义,结合Sakai-Kasahara私钥提取结构以及椭圆曲线上相关的困难问题给出了一个基于身份的签密密钥封装的实例方案,并在随机预言机模型下对该实例方案的安全性进行了证明.该方案具有ID-IND-CCA保密性安全和ID-UF-CMA不可伪造性安全.提出的实例方案在会话密钥封装阶段不需要进行对计算以及映射到点的Hash函数计算.通过有效的对优化计算和点压缩技术,本实例方案在具有高安全性的同时也具有执行性能上的优势. Hybrid schemes in a KEM-DEM structure is regarded as the most natural approach to public key encryption with IND-CCA security and practical efficiency. Traditional KEM is realized by public key scheme, which only provides confidentiality security for session key used by DEM. In 2005, combining the idea of signcryption with the KEM-DEM model hybrid encryption, Alexander proposed a signcryption KEM-DEM model hybrid signcryption primitive. Signeryption KEM means that the sender's private key and the receiver's public key are used together to generate session key and key encapsulation. Compared with traditional KEM scheme, Signcryption KEM can provide both confidentiality security and unforgeability security for session key. In this paper the definition of signcryption KEM is extended in ID-based cryptography. Based on Sakai-Kasahara identity-based key contracture and elliptic-curves-related hard problems, an instance scheme of ID-based signeryption key encapsulation is proposed. Security properties of the proposed scheme are proven with the random oracle model. The proposed scheme is ID-IND-CCA secure in confidentiality and ID-UF-CMA secure in unforgeability. At the encapsulation phase of the proposed scheme, no paring computing and no MapToPoint hash function are required. According to the recent advances in pairings optimized computing and point reduction, the proposed scheme is not only secure but also has advantage in performance.
出处 《计算机研究与发展》 EI CSCD 北大核心 2009年第5期857-863,共7页 Journal of Computer Research and Development
基金 国防科技重点实验室基金项目(51436050404QT2202)
关键词 签密 密钥封装 基于身份密码学 可证明安全 保密性 不可伪造性 signcryption key encapsulation ID-based cryptography provable security confidentiality unforgeability
  • 相关文献

参考文献19

  • 1Zheng Y. Digital signcryption or how to achieve cost (Signature & Encryption ) cost ( Signature ) + cost (Encryption) [G]//LNCS 1294 : Advances in Cryptology- Crypto'97. Berlin: Springer, 1997:165-179
  • 2Zheng Y. Identification, signature and signcryption using high order residues modulo an RSA composite [C] HLNCS 1992: Proc of PKC'01. Berlin: Springer, 2001:48-63
  • 3Zheng Y. Signcryption and its applications in efficient public key solutions [C] //LNCS 1397: Proc of ISW'97. Berlin: Springer, 1998:291-312
  • 4Yum B H, Lee P J. New signcryption schemes based on KCDSA [C] //LNCS 2288: Proc of ICISC'01. Berlin: Springer, 2001:305-317
  • 5赵福祥,赵红云,王育民.一个采用惟密文验证签字的Mobile Agent新方案[J].计算机研究与发展,2001,38(7):811-815. 被引量:3
  • 6Cramer R, Shoup V. Design and analysis of practical publickey eneryption schemes secure against adaptive chosen eiphertext attack [J]. SIAM Journal on Computing, 2003, 33(1): 167-226
  • 7Dent A W. Hybrid signcryption schemes with outsider security [C] //LNCS 3650: Proc of ISC 2005. Berlin: Springer, 2005:203-217
  • 8Shamir A. Identity-based cryptosystems and signature schemes [C] //LNCS 196: Advances in Cryptology- Proceedings of CRYPTO'84. Berlin: Springer, 1985:48-53
  • 9Boneh D, Franklin M. Identity based eneryption from the weil pairing [C]//LNCS 2139: Advances in Cryptology Crypto 2001. Berlin: Springer, 2001:213-229
  • 10Lee J M. Identity based signcryption [OL]. [2002-07-19]. http://eprint. iacr. org/2002/098

二级参考文献6

  • 1Wang X F,Australian Workshop on Distributed Artificial Intelligence:Multi-agent System:Theories,Languages and,1998年,183页
  • 2Bao F,Proc of the 1st Int Workshop on Practice and Theory in Public Key Cryptography,1998年,55页
  • 3Zheng Y L,Proc Information Security Workshop:Information Security,1997年,201页
  • 4Gamage C,2nd Int'l Workshop Practice Theory Public Key Cryptography,1999年,69页
  • 5王育民,通信网的安全.理论与技术,1999年
  • 6伊丽江,白国强,肖国镇.代理多重签名[J].计算机研究与发展,2001,38(2):204-206. 被引量:31

共引文献2

同被引文献48

  • 1Zheng Yuliang.Digital signcryption or how to achieve cost (signature and encryption) 《《 cost (signature) + cost (encryption)[G] //LNCS1294,CRYPTO'1997.Berlin:Springer,1997:165-179.
  • 2AI-Riyami S S,Paterson K G.Certificateless public key cryptography[G] //LNCS2894:Asiacrypt'03.Berlin!Springer,2003:452-473.
  • 3Shamir A.Identity-based cryptosystems and signature schemes[G] //LNCS196:CRYPTO'1984.Berlin; Springer,1984:47-53.
  • 4Aranha D,Castro R,Lopez J,et al.Efficient certificateless signcryption[EB/OL].(2008-09-05)[2009-03-21].http.//sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_01_resumo.pdf.
  • 5Wu Chenhuang,Chen Zhixiong.A new efficient certificateless signcryption scheme[C] //Proc of ISISE'08.Piscataway,NJ:IEEE,2008:661-664.
  • 6Barreto P L,Deusajute A M,Cruz E C,et al.Toward efficient certificateless signcryption from (and without)bilinear pairings[EB/OL].(2008-09-05)[2009-03-21].http://sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_03_artigo.pdf.
  • 7Sharmila D S,Vivek S S,Pandu R C.On the security of certificateless signcryption schemes[EB/OL].(2009-03-05)[2009-06-12].Http://eprint.Iacr.Org/2009/298.Pdf.
  • 8Barbosa M,Farshim P.Certificateless signcryption[C] //Proc of ASIACCS'2008.New York:ACM,2008:369-372.
  • 9Li Fagen,Masaaki S,Tsuyoshi T.Certificateless hybrid signcryption[G] //LNCS5451,Proc of ISPEC2009.Berlin,Springer,2009:112-123.
  • 10Cramer R,Shoup V.Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack[J].SIAM Journal on Computing,2004,33(1):167-226.

引证文献4

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部