期刊文献+

基于身份的签密方案 被引量:7

ID-based Signcryption Scheme
下载PDF
导出
摘要 现有基于身份的签密方案存在签密不能被公开验证、签密能被伪造和签密不具有健壮性等缺陷。分析LHL方案的安全性,利用双线性对提出一个基于身份的签密方案,该方案能保证签密具有公开验证性、不可伪造性、健壮性、不可否认性和前向安全性,它只需要4个对运算,其效率高于其他基于身份的签密方案。 The existing ID-based signcryption schemes have some drawbacks, such as the signcryption can not be public verified, the signcryption can be forged, the signcryption is not robust, and etc. This paper analyzes the security of the LHL scheme and adopts the bilinear parings to propose an 1D-based signcryption scheme. This scheme can ensure the signcryption has some characters, such as public verifiability, unforgeability, robustness, non-repudiation and forward security. It only needs four pairs of operation and it is more efficient than other ID-based signcryption schemes.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第22期144-146,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60773035) 西南交通大学信息编码与传输四川省重点实验室开放研究课题基金资助项目(08226138)
关键词 签密 基于身份 双线性对 健壮性 signcryption ID-based bilinear parings robustness
  • 相关文献

参考文献7

  • 1Zheng Yuliang. Digital Signcryption or How to Achive Cost (Signature & Encryption)<<Cost(Signature)+Cost(Encryption)[C]// Proc. of CRYPTO'97. Berlin, Germany: Springer-Verlag, 1997: 165-179.
  • 2Shamir A. Identity-based Cryptosystems and Signature Schemes[C]// Proc. of CRYPTO'84. Berlin, Germany: Springer-Verlag, 1984: 47-53.
  • 3Malone-Lee J. Identity-based Signcryption[EB/OL]. [2009-01-22]. http://eprint. Iacr. Org/2002/098.
  • 4Paterson K G. ID-based Signatures from Pairings on Eliptic Curves[J]. Electronics Letters, 2002, 38( 18): 1025-1026.
  • 5李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 6刘春刚,周廷显.一种新的有效签密方案的研究[J].南京理工大学学报,2006,30(6):739-741. 被引量:4
  • 7余昭平,康斌.基于Hess签名的公开可验证签密方案[J].计算机工程,2008,34(3):199-201. 被引量:6

二级参考文献35

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 3李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 4[1]Shamir A.Identity-based cryptosystems and signature schemes[A].Advances in Crytology-Crypto ' 84,LNCS 196[C].Berlin:Springer-Verlag,1984,47-53.
  • 5[2]Cha J C,Cheon J H.An identity-based signature from gap diffie-hellman groups[A].Public Key Cryptography-PKC'2003 (LNCS 2567)[C].Berlin:SpringerVerlag,2003.18-30.
  • 6[3]Boneh D,Lynn B,Shacham H.Short signatures from the weil pairing[A].Proc Advances in CryptologyAsiacrypt 2001[C].Gold Coast,Queensland,Australia:[s.n.],2001.514-532.
  • 7[4]Cha J C,Cheon J H.An Identity-based signature from Gap Diffie-Hellman groups[EB/OL].http://eprint.iacr.org/2002/0184,2002 -02-15.
  • 8[5]Paterson K G.ID-based signatures from pairings on elliptic curves[J].Electron Lett,2002,38 (18):1 025-1 026.
  • 9[6]Hess F.Efficient identity based signature schemes based on pairings[A].Advances in Cryptology-Asiacrypt'2001,LNCS 2595[C].Berlin:Springer-Verlag,2003.310-324.
  • 10[7]Zheng Y.Digital signcryption or how to achieve cost(signature & encryption) 《cost (signautre)-+ -cost(encryption)[A].Advance in Cryptology CRTPTO97 (LNCS1294)[C].Germany:Springer-Verlag,1997.165-179.

共引文献76

同被引文献30

  • 1陈洪武,熊选东,朱亮宇.一种基于身份的私钥分发方案的分析改进[J].微计算机信息,2008,24(6):80-82. 被引量:3
  • 2陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 3李喆,刘军.卫星网络安全路由研究[J].通信学报,2006,27(8):113-118. 被引量:21
  • 4李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 5Sui Aifen, Chow S S M, Hui L C K, et al. Seperable and Anonymous Identity Based Key Issuing Without Secure Channel[C]//Proc. of ICPAD'05. [S. l. ]: IEEE Computer Society, 2005.
  • 6Wang Changji, Li Qin, Yang Xingfeng. Improvement on Sui et al.s Separable and Anonymous Key Issuing Protocol in ID- based Cryptosystem [J]. International Journal of Computer Science and Network Security, 2006, 6(5B): 161-165.
  • 7Zheng Yuliang. Digital Signcryption or How to Achieve Cost(Signature and Encryption)<<Cost(Signature)+Cost(Encryption)[C]//Proc. of CRYPTO'97. [S. l.]: Springer-Verlag, 1997.
  • 8Shamir A. Identity-based Cryptosystems and Signature Schemes[C]//Proc, of CRYPTO'84. [S. l.]: Springer-Verlag, 1984.
  • 9Boneh D, Franklin M. Identity-based Encryption from the Weil Pairing[C] //Proc. of CRYPTO’01. [S. l.] : Springer-Verlag, 2001.
  • 10Malone L J. Improved Identity-based Signcryption[M]. Berlin, Germany: [s. n.] , 2005.

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部