期刊文献+

基于身份的环签密方案 被引量:1

Identity-based ring signcryption scheme
下载PDF
导出
摘要 目的研究如何设计安全、高效的基于身份的环签密方案。方法首先提出了一个高效的基于身份的签名方案,给出了其安全性证明。其次,基于该签名方案,构造了一个基于身份的环签密方案。结果该环签密方案能够使消息发送者以完全匿名的方式发送消息,且可以同时实现保密性和认证性两种功能,在计算双线性Diffie-Hellman假设下证明了该方案可以抵抗适应性选择密文攻击。结论与已有的基于身份的环签密相比,本文方案效率更高,且消息的扩张长度大大降低,非常适用于传输带宽受限的环境。 Aim To study how to design a secure and efficient identity-based ring signcryption. Methods An efficient and provably-secure identity-based signature (IBS) scheme is proposed in this paper, and then a new identity-based ring signcryption scheme (IBRSC) based on our IBS scheme is presented. Results Using this IBRSC scheme, a sender can anonymously send a message, and the confidentiality and authenticity of the message are realized at the same time. It's proved that our IBRSC scheme is secure against adaptively chosen ciphertext attack under the computational bilinear Diffie-Hellman assumption. Conclusion Compared with the existing IBRSC schemes, our scheme achieves higher efficiency and has very short information expansion, which can be used in environments with stringent bandwidth constraints.
作者 杜红珍
出处 《宝鸡文理学院学报(自然科学版)》 CAS 2009年第3期4-8,共5页 Journal of Baoji University of Arts and Sciences(Natural Science Edition)
基金 宝鸡文理学院项目(ZK08102)
关键词 签密 环签密 双线性对 计算双线性Diffie-Hellman问题 signcryption ring signcryption bilinear pairings computational bilinear Diffie-Hellman problem
  • 相关文献

参考文献16

  • 1ZHENG Y. Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) -1-cost (encryption) [C]. In Proceedings Crypto' 97. Springer-Verlag, 1997:165-179.
  • 2LIBERT B, QUISQUATER J J. Improved signcryption from q-Diffie-Hellman problems[C]. Security Communication Networks-SCN04, LNCS. Berlin: Springer-Verlag, 2005 : 220-234.
  • 3TSO R, OKAMOTO T, OKAMOTO E. An improved signcryption Scheme and its variation[C]. Proceedings of the International Conference on Information Technology, 2007: 772-778.
  • 4粟栗,崔国华,李俊,郑明辉.签密的仲裁安全与仲裁安全的签密方案[J].电子学报,2007,35(11):2117-2122. 被引量:2
  • 5MAC. Efficient short signcryption scheme with public verifiability[C]. Inscrypt'2006, LNCS4328, Berlin: Springer, 2006 : 118-129.
  • 6LI F, XIN X, HU Y. Indentity-based broadcast signeryption [J]. Computer Standards & Interfaces, 2008, 30(1) :89-94.
  • 7杜红珍,温巧燕.高效的短签密方案[J].北京邮电大学学报,2008,31(1):84-87. 被引量:11
  • 8SHAMIR A. Identity-based cryptosystems and signature schemes[C]. Crypto' 84, Springer-Verlag. 1984:47-53.
  • 9RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret [A]. Asiacrypt'2001, LNCS 2248, Springer-Verlag, 2001 : 552-565.
  • 10HUANG X, SUSILO W, MU Y. Identity-based ring signcryption schemes: Cryptographic primitives for preserving privaey and authenticity in, the ubiquitous world[C]. Proeeedings of the AINA' 05, 2005:1-6.

二级参考文献21

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2王彩芬,贾爱库,刘军龙,于成尊.基于签密的多方认证邮件协议[J].电子学报,2005,33(11):2070-2073. 被引量:10
  • 3张串绒,肖国镇.一个可公开验证签密方案的密码分析和改进[J].电子学报,2006,34(1):177-179. 被引量:16
  • 4MIAO Fuyou XIONG Yan YANG Shoubao WANG Xingfu.A Provable Encrypted Ring Signature from Bilinear Pairings[J].Chinese Journal of Electronics,2006,15(2):204-208. 被引量:3
  • 5Zheng Y L. Digital signcryption or how to achieve cost( signature & encryption) ( cost (siganture) + cost (encryption) [ A ]. Kaliski B D. Advances in Cryptology-CRYFIO' 97 [ C ]. Berlin: Springer-Verlag, 1997. LNCS 1294:165-179.
  • 6Zheng Y L, Imai H. Using signcryption to build compact and unforgeable key establishment over an ATM network[ A]. Proceedings of IEEE INFOCOM' 98 [ C ]. San Francisco: CA, 1998.411-418.
  • 7Baek J, Steinfeld R, Zheng Y L. Formal Proofs for the Security of Signcryption [ A ]. Naccache D. PKC 2002 [ C ]. Berlin: Springer-Vedag, 2002. LNCS 2274: 80-98.
  • 8Lee M K, Kim D K, Park K. An authenticated encryption scheme with public verifiability [ A ]. 5th Japan-Korea Joint Workshop on Algorithms and Computation [ C]. Tokyo: IEEE Press, 2000.49-56.
  • 9Jeong I R, Jeong H Y, Rhee H S. Provably secure encrypt-thensign composition in hybrid signcryption[ A]. Lee P J and Lim C H. ICISC 2002 [ C]. Berlin: Springer-Verlag, 2003. LNCS 2587:16-34.
  • 10Shin J B, Lee K, Shim K. New DSA-verifiable signcryption schemes[A] .Lee P J and Lim C H. ICISC 21302[ C] .Berlin: Springer-Verlag, 2003. LNCS 2587: 35-47.

共引文献12

同被引文献10

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部