期刊文献+

基于ECC的自认证广义指定验证者签密 被引量:2

Self-certified Universal Designated-Verifier Signcryption Based on Elliptic Curve Cryptosystem
下载PDF
导出
摘要 广义指定验证者签名允许签名的持有者指定签名给指定的验证者,但仅有指定的验证者能够验证这个签名,针对该问题,利用椭圆曲线密码体制(ECC)和自认证签密的特点,提出一个基于ECC的自认证广义指定验证者签密。该方案不仅消除了证书存在问题和密钥托管问题,而且具有算法复杂度低、处理速度快、存储空间占用小等特点,适合应用于电子投票、电子拍卖等领域。 Universal designated-verifier signature allows a signature holder to designate the signature to a desire designated-verifier,in such a way only the designated verifier can verify this signature.Using the merits of Elliptic Curve Cryptosystem(ECC) and self-certified signcryption,a new self-certified universal designated-verifier signcryption based on ECC is presented.The scheme eliminates certificate existence problem and key escrow problem.It has low algorithm complexity,quick proceeding speed and little storage space,so it is propitious to applications in E-vote and E-auction.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第16期124-125,共2页 Computer Engineering
基金 国家自然科学基金资助项目(60863006) 教育部科学技术研究基金资助重点项目(208148) 青海省科技厅软课题基金资助项目(2008-Z-620)
关键词 自认证签密 广义指定验证者签名 椭圆曲线密码体制 self-certified signcryption universal designated-verifier signature Elliptic Curve Cryptosystem(ECC)
  • 相关文献

参考文献6

二级参考文献26

  • 1耿莉,王尚平,周峰,燕召将.一种新的基于身份的签密方案[J].计算机工程,2004,30(19):52-54. 被引量:9
  • 2Zheng Yuliang. Digital Signcryption or How to Achieve Cost (Signature & Encryption) Cost(Signature)+Cost(Encryption)[C]// Proc. of Cryptology-CRYPYO'97. Berlin, Germany: Springer- Verlag, 1997.
  • 3He Weihua, Wu Tongchen. Cryptanalysis and Improvement of Petersen-michels Signcryption Scheme[J]. lEE Proceedings: Computers and Digital Technique, 1999, 146(2): 123-124.
  • 4Bao Feng, Deng R H, A Signcryption Scheme with SignatureDirectly Verifiable by Public Key[C]//Proc. of Cryptography- PKC'98, Berlin, Germany: Springer-Verlag, 1998.
  • 5Yum D H, Lee P J. New Signcryption Schemes Based on KCDSA[C]//Proc. of ICISC'01. Berlin, Germany: Springer-Verlag, 2001.
  • 6Jung H Y, Lee D H, Lira J I, et al. Signcryption Schemes with Forward Secrecy[C]//Proc. of WISA'01. Seoul, Korea: [s. n.], 2001.
  • 7Girault M. Self-certified Public Keys[C]//Proc. of Cryptology- EUROCRYPT'91. Berlin, Germany: Springer-Verlag, 1991.
  • 8[1]Koblitz N.Elliptic Curve Cryprosystems. Mathematics of Computation, 1987, 48:203-209
  • 9[2]Miller V S.Use of Elliptic Curves in Cryptography. Advances in Cryptology-CRYPTO'85, New York: Spring-Verlag, 1986, LNCS 218:417-426
  • 10[3]Robshaw M,Yin Y.Elliptic Curve Cryptosystems. An RSA Laboratories Technical Note, 1997-06

共引文献24

同被引文献26

  • 1LI Fagen,HU Yupu,LIU Shuanggen.Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings[J].Wuhan University Journal of Natural Sciences,2007,12(1):17-20. 被引量:5
  • 2Tzeng Z J, Tzeng W (3. Authentication of Mobile Users in Third Generation Mobile System[J]. Wireless Personal Communications, 2001, 16(1): 35-50.
  • 3Lee C C, Yang Chaochen, Hwang M S. A New Privacy and Authentication Protocol for End-to-end Mobile Users[J]. International Journal of Commmunication Systems, 2003, 16(9): 799-808.
  • 4Chang C C, Chen Kuolun, Hwang M S. End-to-end Security Protocol for Mobile Communications with End-user Identification/ Authentication[J]. Wireless Persona/Communications, 2004, 28(2) 95-106.
  • 5Zhu Jianming, Ma Jianfeng. A New Authentication Scheme with Anonymity for Wireless Environments[J]. IEEE Transactions on Consumer Electronics, 2004, 50(1): 231-235.
  • 6Lee C C, Hwang M S. Security Enhancement on a New Authentication Scheme with Anonymity for Wireless Environments[J]. IEEE Transactions on Industrial Electronics, 2006.53(5): 1683-1687.
  • 7Xu Jing, Zhu Wentao, Feng Dengguo. An Efficient Mutual Authentication and Key Agreement Protocol Preserving User Anonymity in Mobile Networks[J]. Computer Communications, 2011, 34(3): 319-325.
  • 8ZHENG Y L. Digital signcryption or how to achieve cost(signature & encryption) <C cost ( signature) + cost ( encryption)[C] // Proceedings of the 17th Annual International Cryptology Con-ference on Advances in Cryptology. Berlin: Springer, 1997: 165 -179.
  • 9BAEK J, STEINFELD R, ZHENG Y L. Formal proofs for the secur-ity of signcryption[ C] // Proceedings of the 5 th International Work-shop on Practice and Theory in Public Key Cryptosystems. Berlin:Springer-Verlag, 2002: 81 -98.
  • 10MALONE-LEE J. Identity-based signcryption[ EB/OL]. [2013-06-14]. http: //eprint. iacr. org/2002 /098. pdf.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部