期刊文献+

基于ECC的自认证代理签密方案 被引量:5

Self-certified Proxy Signcryption Scheme Based on Elliptic Curve Cryptography
下载PDF
导出
摘要 为了克服代理签密中的证书管理问题和密钥托管问题,提出了一种新的基于椭圆曲线密码体制(ECC)的自认证代理签密方案,其困难性基于椭圆曲线离散对数问题(ECDLP)。与已有文献相比,此方案具有安全性强、密钥长度短、所需要存储空间少、占用带宽小、计算量和通信量低等优点。 To overcome certificate management problem and key escrow problem in proxy signcryption schemes, a new self-certified proxy signcryption scheme based on elliptic curve cryptography(ECC) was proposed,it hardness relys on elliptic curve discrete logarithm problem(ECDLP). Compared with the existence literatures, the proposed scheme possesses good security and shorter key,less requirement of storage space and less bandwith requirement,lower computational complexity and communication cost.
出处 《计算机科学》 CSCD 北大核心 2010年第7期91-92,101,共3页 Computer Science
基金 教育部科学技术研究重点项目(208148) 甘肃省科技攻关项目(2GS064--AS2-035-03) 青海省科技厅软课题项目(2008-Z-620) 青海省重点课程<现代操作系统>建设项目资助
关键词 代理签密 自认证代理签密 自认证签密 椭圆曲线离散对数问题 Proxy signcryption, Self-certified proxy signcryption, Self-certified signcryption, Elliptic curve discrete logarithm problem
  • 相关文献

参考文献12

  • 1Gamage C,Leiwo J,Zheng Y.An efficient scheme for secure message transmission using proxy signcryption[C] ∥Procee-dings of 22nd Australasian computer science conference.Berlin:Springer-Verlag,1999:420-431.
  • 2Chan W K,Wei V K.A threshold proxy signcryption[C] ∥Proceedings of International Conference on Security and Management.Monte Carlo Resort,Las Vegas,Nevada,USA,2002:24-27.
  • 3Wang Q,Cao Z F.Two proxy signcryption schemes from bilinear pairings[C] ∥Proceedings of CANS 2005,LNCS 3810.Berlin:Springer-Verlag,2005:161-171.
  • 4Wang M,Li H,Liu Z J.Efficient identity based proxy-signcryption schemes with forward security and public verifiability[C] ∥ICCNMC 2005.LNCS3619.Berlin:Springer-verlag,2005:982-991.
  • 5Li X X,Chen K F.Identity based proxy-signcryption scheme from pairings[C] ∥IEEE International Conference on Services Computing.Los Alamitos,California:IEEE Computer Society Press,2004:494-497.
  • 6刘俊宝,肖国镇.带门限共享解密的多代理签密方案[J].计算机工程,2006,32(23):21-23. 被引量:4
  • 7胡振鹏,钱海峰,李志斌.基于身份的多接收者的代理签密方案[J].华东师范大学学报(自然科学版),2008(1):83-88. 被引量:10
  • 8于刚,黄根勋.一个前向安全的基于身份的代理签密方案[J].计算机工程与应用,2008,44(2):157-159. 被引量:8
  • 9张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 10王书海,冯志勇,綦朝晖.权限可控的公开验证代理签密方案[J].计算机应用,2008,28(12):3163-3164. 被引量:2

二级参考文献61

  • 1耿莉,王尚平,周峰,燕召将.一种新的基于身份的签密方案[J].计算机工程,2004,30(19):52-54. 被引量:9
  • 2陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 3张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 4ZHENG Y L. Signcryption and its applications in efficient public key solutions [ C]// ISW'97: Information Security WorkshOp, LNCS 1397. Berlin: Springer-Verlag, 1998:291-312.
  • 5HORSTER P, MICHELS M, PETERSEN H. Authenticated encryption schemes with to low communication costs [ J]. Electronics Letters, 1994, 30(15) : 1212 - 1213.
  • 6PETERSEN H, MICHELS M. Cryptanalysis and improvement of signcryption schemes [ J]. IEE Computers and Digital Techniques, 1998, 145(4) : 149 - 151.
  • 7BAO FENG, DENGR H. A signcryption scheme with signature directly verifiable by public key [ C]//Public Key Cryptography '98, LNCS 1431. Berlin: Springer-Verlag, 1998:55-59.
  • 8JUNG H, LEE D, LIM J, et al. Signcryption scheme with forward security [C]// Proceedings of WISA 2001. Berlin: Springer-Verlag, 2001.
  • 9SHIN J, LEE K, SHIM K. New DSA-verifiable signcryption schemes [ C]// ICISC 2002: Proceedings of the 5th International Conference on Information Security and Cryptology, LNCS 2587. Berlin: Springer-Verlag, 2003: 35,-47.
  • 10GAMAGE G, LEIWO J, ZHENG Y. An efficient scheme for secure message transmission using proxy-signcryption, TR 98-01 [ R]. Australia: Monash University, 1998.

共引文献33

同被引文献57

  • 1翁健,陈泯融,杨艳江,邓慧杰,陈克非,鲍丰.无需随机预言机的自适应攻陷模型下选择密文安全的单向代理重加密方案[J].中国科学:信息科学,2010,40(2):298-312. 被引量:8
  • 2张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 3Blaze M,Bleumer G,Strauss M.Divertible Protocols and AtomicProxy Cryptography[C]//Proceedings of EUROCRYPT’98.Berlin,Germany:Springer-Verlag,1998:127-144.
  • 4Chu Chengkang,Weng Jian,Sherman S M C.Conditional ProxyBroadcast Re-encryption[C]//Proc.of ACISC’09.Berlin,Germany:Springer-Verlag,2009:327-342.
  • 5Zheng Yuliang.Digital Signcryption or How to Achieve Cost(Signature&Encryption)<.
  • 6Kirtane V,Rangan C P.RSA-TBOS Signcryption with ProxyRe-encryption[EB/OL].[2011-04-12].http://eprint.iacr.org/2008/324.
  • 7Chandrasekar S,Ambika K,Pandu R C.Signcryption with ProxyRe-encryption[EB/OL].[2011-04-22].http://eprint.iacr.org/2008/276.
  • 8Zuo Wei-ping. An ID-Based Proxy Multi-signcryption Scheme from Pairings[C]// Proceedings of 2010 International Conferen- ce on Multimedia Information Networking and Security. Wa- shington, DC, USA: IEEE Computer Society, 2010: 403-405.
  • 9Li Fa-gen, Yu Yong. An Efficient and Provably Secure ID-Based Threshold Signcryption Seheme[C]//Proceedings of 2008 Inter- national Conference on Communications, Circuits and Systems. Berlin: Springer-Verlag, 2008 : 488-492.
  • 10Kirtane V, Rangan C P. RSA-TBOS Signcryption with Proxy Re-encryption[C]//Proceedings of the 8th ACM Workshop on Digital Rights Management. NewYork, NY, USA: ACM, 2008: 59-66.

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部