期刊文献+

一个基于CPK的高效签密方案 被引量:4

An Efficient Signcryption Scheme Based on CPK
下载PDF
导出
摘要 基于组合公钥原理,该文提出一个新的签密方案CPK-SC,抛弃了传统基于身份签密方案中的配对运算,并通过使用对称密码算法解决了传统基于身份签密方案只能处理定长消息的限制。与已有的基于双线性对的签密方案相比,CPK-SC方案计算量小、生成密文短,适用于计算和通信资源受限环境,具有广泛的应用前景。在判定性Diffie-Hellman(DDH)假设下,论文通过随机预言模型证明了CPK-SC的安全性。 In this paper, a new signcryption scheme called CPK-SC is proposed based on Combined Public Key (CPK) to resolve the authentication and non-repudiation problem. CPK-SC discards the pairings and solves the restriction that the traditional identity-based signcryption schemes can only deal with fixed length messages by introduction symmetric cryptography algorithm. CPK-SC spends fewer computations and produces shorter ciphertext, which can be widely used in the environment of computation and communication resource constrained, such as mobile ad-hoc network. In the random oracle model, the security of CPK-SC is tightly related to the Decision Diffie-Helhnan (DDH) assumption.
出处 《电子与信息学报》 EI CSCD 北大核心 2009年第7期1753-1757,共5页 Journal of Electronics & Information Technology
基金 天津市应用基础及前沿技术研究计划项目(09JCBJC00300) 天津市科技发展计划项目基金(05YFGZGX24200)资助课题
关键词 签密 组合公钥 随机预言模型 Decisional Diffie-Hellman(DDH) Signcryption Combined Public Key (CPK) Random oracle model Decisional Diffie-Hellman (DDH)
  • 相关文献

参考文献9

  • 1Chen H Y,LüS W,Liu Z H,et al.An identity-based signcryption scheme with short ciphertext from pairings[].Emerging Directions in Embedded and Ubiquitous Computing workshops.2006
  • 2Barbosa M,Farshim P.Certificateless signcryption[].ACM Symposium on InformationComputer and Communications Security.2008
  • 3Li F,Yu Y.An efficient and provably secure ID-based threshold signcryption scheme[].International conference on communicationscircuits and systems.2008
  • 4Chen Y G,Jia C F,LüS W,et al.Signature scheme with arbitrary length message recovery in combined public key[].Theth International conference on Mobile Ad-hocand Sensor Networks.2008
  • 5Zhong X,Dai G Z,Yang D M.An efficient online/offline signcryption scheme for MANET[].IEEE Advanced Information Networking and Applications Workshops.2007
  • 6Malone-Lee J.Identity based signcryption[].Cryptology ePrint Archive Report /.
  • 7Ren Yanli,Gu Dawu.Efficient Identity Based Signature/Signeryption Scheme in the Standard Model[].DataPrivacyand E-Commerce ISDPE The First International Symposium on.2007
  • 8B. Libert and J. Quisquater.New Identity Based Signcryption Schemes from Pairings[]..2003
  • 9MA Chang-she.Efficient Short Signcryption Scheme withPublic Verifiability[].Inscrypt.2006

同被引文献42

引证文献4

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部