期刊文献+

无证书并行签密方案 被引量:2

Certificateless parallel signcryption scheme
下载PDF
导出
摘要 签密能够同时完成公钥加密和数字签名两项任务,实现消息既保密又认证的双重功能。同时,签密的计算量和通信代价都要低于传统的保密认证方法——先签名后加密。鉴于签密重要性和无证书密码系统的优点,首次提出了一个可证安全的无证书并行签密方案。该签密方案建立在已分别被证明是安全的无证书加密方案和签名方案基础之上。分析显示该签密方案满足诸如不可否认性、可公开验证性和前向安全性等安全性质。 Signcryption schemes can achieve confidentiality and authentication simultaneously by combining public-key encryption and digital signatures,at lower computational costs and communication overheads than the traditional signature-then-encryption approach.Due to the importance of signcryption schemes and the advantage of certificateless cryptography,a provable security certificateless parallel signcryption scheme is put foword for the first time.h is based on a certificateless encryption scheme and a certificateless signature scheme,which have been proved secure respectively.The analysis shows that the signcryption scheme satisfies the security requirements such as non-repudiation,public verifiability and forward security for a signcryption scheme.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第21期85-87,162,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.60673070) 江苏省自然科学基金(No.BK2006217)~~
关键词 无证书密码系统 签密 双线性映射 保密性 不可伪造性 certificateless cryptography signcryption bilinear pairing confidentiality unforgeability
  • 相关文献

参考文献15

  • 1Zheng Y.Digital signcryption or how to achieve cost(signature & encryption≤cost (signature)+cost (encryption)[C]//Kaliski Jr B S.LNCS 1294:Advances in Cryptology-CRYPTO'97.Bertin:Springer Verlag,1997:165-179.
  • 2Steinfeld R,Zheng Y.A signcryption scheme based on integer factorization[C]//LNCS 1975:Proceedings of Information Security Workshop 2000(ISW 2000).Berlin:Springer-Verlag,2000:308-322.
  • 3Malone-Lee J,Mao W.Two birds one stone:Signcryption using RSA[C]//LNCS 2612:CT-RSA 2003.Berlin:Springer Verlag,2003:211-225.
  • 4李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 5Kwak D,Moon S.Efficient distributed signcryption scheme as group signcryption[C]//LNCS 2846:Applied Cryptography and Network Securiry(ACNS'03).Berlin:Springer-Verlag,2003:403-417.
  • 6黄欣沂,张福泰,伍玮.一种基于身份的环签密方案[J].电子学报,2006,34(2):263-266. 被引量:17
  • 7Duon Shan-shan,Cao Zhen-fu.Efficient and provably secure multireceiver identity-based signcryption[C]//Batton L,Safavi-Naini R.LNCS 4058:ACISP 2006.Borlin:Springer-Verlag,2006:195-206.
  • 8An J H,Dodis Y,Rabin T.On the security of joint signature and encryption[C]//Knudsen L R.LNCS 2332:Proc of Eurocrypt'02.Berlin:Springer Verlag,2002:83-107.
  • 9Pieprzyk J,Pointcheval D.Parallel authentication and public-key encryption[C]//LNCS 2727:ACISP'03.Berlin:Springer Verlag,2003:387-401.
  • 10Al-Riyami S S,Patersan K G.Certificateleas public key cryptography[C]//LNCS 2894:Advance in Cryptography Asiacrypt 2003.Berlin:Springer Verlag,2003:452-473.

二级参考文献23

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 3Zheng Y.Digital signcryption or how to achieve cost (signature & encryption)≤cost (signature)+ cost (encryption)[A].Advances in Cryptology-Crypto′97,LNCS 1294[C].Berlin:Springer-Verlag,1997.165-179.
  • 4Shamir A.Identity based cryptosystems and signature schemes[A].Advances in Cryptology-Crypto′84,LNCS 196[C].Berlin:Springer-Verlag,1984.47-53.
  • 5Herranz Javier,Sáez Germán.A provable secure ID-based ring signature scheme[DB/OL].Available at http://eprint.iacr.org/2003/261.
  • 6Boneh D,Lynn B,Shacham H.Short signatures from the weil pairing[A].Asiacrypt′01,LNCS 2248[C].Berlin:Springer-Verlag,2001.514-532.
  • 7Baek Joonsang,Zheng Yuliang.Identity-based threshold decryption[A].PKC′04,LNCS 2947[C].Berlin:Springer-Verlag,2004.262-276.
  • 8Boneh D,Franklin M.Identity-based encryption from the weil pairing[A].Crypto′01,LNCS 2139[C].Berlin:Springer-Verlag,2001.213-229.
  • 9Rivest R L,Shamir A,Tauman Y.How to leak a secret[A].Asiacrypt′01,LNCS 2248[C].Berlin,Springer-Verlag,2001.552-565.
  • 10Baek Joonsang,Ron Steinfeld,Yuliang Zheng.Formal proofs for the security of signcryption[A].PKC′02,LNCS 2274[C].Berlin:Springer-Verlag,2002.80-98.

共引文献84

同被引文献18

  • 1Shamir A.Identity based cryptosystems and signature schemes[C]// LNCS 196: Proceedings of Crypto' 84.Berlin: Springer-Verlag, 1984:47-53.
  • 2A1-Riyami S,Paterson K.Certificateless public key cryptography[C]// LNCS 2894: Proceedings of Asiacrypt' 03.Berlin: Springer-Verlag, 2003 : 452-473.
  • 3Zheng Y.Digital signcryption or how to achieve cost(signature & eneryption) cost (signature) +cost (encryption) [C]//LNCS 1294: Proceedings of Crypto' 97.Berlin: Springer-Verlag, 1997:165-179.
  • 4Barbosa M, Farshirn ECertificateless signcryption[C]//Proceedings of ASIACCS'08.New York:ACM,2008:369-372.
  • 5Li F, Shirase M, Takagi T.Certificateless hybrid signcryption[C]// LNCS 5451: Proceedings of ISPEC' 09.Berlin: Springer-Verlag, 2009:112-123.
  • 6Zhang L, Zhang F.A new provably secure certificateless signature scheme[C]//Proceedings of ICC' 08, IEEE,2008 : 1685-1689.
  • 7Cramer R, Shoup V.Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack[J].SIAM Joumal on Computing, 2003,33 ( 1 ) : 167-226.
  • 8Barreto P,Kim H,Lynn B ,et al.Efticient algorithms for pairingbased cryptosystems[C]//LNCS 2442: Proceedings of Crypto' 02. Berlin: Springer-Verlag, 2002 : 354-368.
  • 9Barreto P, Kim H, Lynn B, et al.Efficient implementation of pairing-based cryptosystems[J].Joumal of Cryptology, 2004, 17 (4) :321-334.
  • 10Barreto P, Galbraith S, hEigeartaigh C 0, et al.Efticient pairing computation on supersingular Abelian varieties[J].Designs, Codes and Cryptography, 2007,42 (3) : 239-271.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部