期刊文献+

标准模型下可证安全的基于身份门限签密方案 被引量:2

Provable Secure Identity-Based Threshold Signcryption Scheme in the Standard Model
下载PDF
导出
摘要 提出了一种有效的基于身份的门限签密方案.采用双线性对映射技术,基于Waters和Paterson提出的签名方案,设计了标准模型下可证安全的门限签密方案,并利用决策双线性Diffie-Hellman问题的困难性证明了方案的语义安全性,同时利用计算Diffie-Hellman问题的困难性证明了方案的不可伪造性.相对随机预言模型下的同类方案,本文方案更具有实际意义. An efficient identity-based threshold signcryption scheme was presented.With bilinear pairings technology,a proved secure threshold signcryption scheme was designed in the standard model,based on Waters and Paterson's signature scheme.We prove its semantic security on the hardness of decisional bilinear Diffie-Hellman problem and its unforgeability on the hardness of computational Diffie-Hellman problem.Compared with other schemes in the random oracle model,this scheme is more meaningful.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2010年第2期11-15,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60674054)
关键词 门限签密 标准模型 计算DIFFIE-HELLMAN问题 决策双线性Diffie-Hellman问题 threshold signcryption standard model computational Diffie-Hellman problem decisional bilinear Diffie-Hellman problem
  • 相关文献

参考文献14

  • 1Shamir A. Identity-based cryptosystems and signature schemes[ C ] //Proceedings of Crypto 1984. New York: Springer-Verlag, 1985 : 47-53.
  • 2Boneh D, Franklin M. Identity-based encryption from the Weil pairing [ C ] // Proceedings of Crypto 2001. SantaBarbara: Springer-Verlag, 2001: 213-229.
  • 3Gentry C. Practical identity-based encryption without random oracles [ C ] // Proceedings of Eurocrypt 2006. St. Petersburg: Springer-Verlag, 2006 : 445-464.
  • 4Waters B. Efficient identity-based encryption without random oracles [ C ] //Proceedings of Eurocrypt 2005. Aarhus : Springer-Verlag, 2005 : 114-127.
  • 5Hess F. Efficient identity based signature schemes based on pairings [ C]// Proceedings of SAC 2002. Newfoundland : Springer-Verlag, 2002 : 310-324.
  • 6Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in the standard model[ C ] // Proceedings of ACISP 2006. Melbourne : Springer-Verlag, 2006 : 207- 222.
  • 7Zheng Yuliang. Digital signcryption or how to achieve cost ( signature & encryption) << cost ( signature ) + cost (encryption) [ C ]//Advances in Cryptology-Crypto 1997. California : Springer-Verlag, 1997 : 165 - 179.
  • 8An J H, Yevgeniy Dodis, Tal Rabin. On the security of joint signature and encryption[ C ]/JAdvances in Cryptology-Eurocrypt 2002. Netherlands : Springer-Verlag, 2002 : 83-107.
  • 9Libert B, Quisquater J J. Efficient signcryption with key privacy from gap diffie-hellman groups[ C ]//Proceedings of PKC 2004. Singapore: Springer-Verlag, 2004: 187- 200.
  • 10Malone-Lee J. Identity-based signcryption [ EB/OL ]. 2002. http://eprint, iacr. org/.

同被引文献13

  • 1陈瑞虎,高峰修,马传贵.GOST门限签密方案[J].微计算机信息,2005,21(11X):9-10. 被引量:5
  • 2段姗姗,曹珍富,陆荣幸.基于身份的强壮门限签密方案[J].上海交通大学学报,2005,39(12):1946-1949. 被引量:6
  • 3彭长根,李祥,罗文俊.一种面向群组通信的通用门限签密方案[J].电子学报,2007,35(1):64-67. 被引量:14
  • 4Peng Changgen,Li Xiang.An Identity-based Threshold Signcryption Scheme with Semantic Security[C]//Proceedings of CIS’05.Xi’an,China:[s.n.],2005:173-179.
  • 5Libert B,Quisquater J J.New Identity-based Signcryption Schemes from Pairings[C]//Proceedings of20031EEE Information Theory Workshop.Berlin,Germany:[s.n.],2003:155-158.
  • 6Li Fagen,Yu Yong.An Efficient and Provably Secure ID-based Threshold Signcryption Scheme[C]//Proceedings of ICCCAS’08.Xiamen,China:SpringerVerlag,2008:488-492.
  • 7Li Xiangxue,Qian Haifeng,Weng Jian,et al.Fully Secure Identity-based Signcryption Scheme with Shorter Signcryptext in the Standard Model[J].Mathematical and Computer Modelling,2013,57(3/4):503-511.
  • 8Koblitz N,Menezes A,Vanstone S.The State of Elliptic Curve Cryptography[J].Designs,Codes and Cryptography,2000,30(19):173-193.
  • 9Dan Boneh,Ben Lynn,Hovav Shacham.Short Signatures from the Weil Pairing[J].Journal of Cryptology.2004(4)
  • 10Cramer R,Shoup V.Signature schemes based on thestrong RSA assumption[].ACM TISSEC.2000

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部