期刊文献+

基于身份的签密和代理签密方案 被引量:4

Identity Based Signcryption and Proxy Signcryption Schemes
下载PDF
导出
摘要 首先给出一个基于身份的签密方案。在此基础上,提出基于身份的代理签密方案,并对两个新方案的安全性和效率进行分析。结果表明,该基于身份签密方案和基于身份代理签密方案的保密性在BDH假设下是语义安全,即IND-IBSC-CCA2安全的。在CDH假设下,方案是适应性选择消息和身份攻击下存在性不可伪造的。 An identity based signcryption scheme is proposed.Another identity based proxy signcryption scheme is given based on signcryption scheme.The security and efficiency of the schemes is analyzed as well.The two schemes satisfy the semantic security notion IND-IBSC-CCA2 under the Bilinear Diffie-Hellman assumption.The unforgeability against adaptive chosen message and identity attack derives under the Computational Diffie-Hellman assumption.
出处 《信息工程大学学报》 2010年第4期458-461,共4页 Journal of Information Engineering University
基金 国家863计划资助项目(2009AA01Z417)
关键词 基于身份签密 基于身份代理签密 双线性对 语义安全 不可伪造性 identity based signcryption identity based proxy signcryption bilinear pairing semantic security unforgeability
  • 相关文献

参考文献8

  • 1Shamir.Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology-CRYPTO'84.Berlin:Springer-Verlag,1984:47-53.
  • 2Zheng Y.Digital signcryption or how to achieve cost(signature&encryption) 《《cost(signature)+cost(encryption)[C]//Advances in Cryptology-CRYPTO'97.Berlin:Spriinger-Verlag,1997:165-179.
  • 3Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[C]//3rd AC-Conference on Computer and Communications Security (CCS'96).1996:48-57.
  • 4Li Xiangxue,Chen Kefei.Identity based proxy-signcryption scheme from pairings[C]//Proceedings of the 2004 IEEE International Conference on Service Computing (SCC'04).2004:494-497.
  • 5Wang Meng,Li Hui,Liu Zhijing.Efficient identity based proxy-signcryption schemes with forward security and public verifiability[C]//Networking and Mobile Computing (ICCNMC2005).Berlin:Springer-Verlag,2005:982-991.
  • 6Hassan Elkamchouchi,Yasmine Abouelseoud.A new proxy identity-based signcryption scheme for partial delegation of signing rights[EB/OL].[2008-06-02].http://eprint.iacr.org/2008/041.pdf.
  • 7Chen L,Malone-Lee J.Improved identity-based signcryption[C]//Public Key Cryptography PKC 2005.Berlin:Springer-Verlag,2005:362-379.
  • 8Ji Huifang,Han Wenbao,Zhao Long.An identity-based proxy signature from bilinear pairings[C]//2009 WASE International Conference on Information Engineering(ICIE′09).2009:14-17.

同被引文献46

  • 1段姗姗,曹珍富,陆荣幸.基于身份的强壮门限签密方案[J].上海交通大学学报,2005,39(12):1946-1949. 被引量:6
  • 2张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 3Shair A. Identity-based cryptosystems and signature schemes [ C ]//Advances in Cryptology : crypto' 84. Berlin : springer, 1984 : 47-53.
  • 4Boneh D, Franklin M. Identity-based encryption from the well pairing[ C ]//Advances in Cryptology. 2001:213-229.
  • 5Boneh D, Lynn B, Shaeham H. Short signature from the weil pairing[ C]//Advances in Cryptology. 2001:514-532.
  • 6Abadi M,Grodon A D. A calculus for Cryptographic Protocols:The Spicalculus[ C ]//Proceedings of the Fourth ACM Conference of Communication Secruity. 1997:21-27.
  • 7Zheng Y. Digital Signcryption or How to Achieve Cost ( signature& encryption << cost (sign-ature) + cost (encryp-tion) [ C ]// Advances in Cryptology-CRYPTO' 97. 1997 : 165-179.
  • 8Chaum D. Blind Signature for Untraceable Payments[C]// Proc. of CRYPTO'82. New York, USA: [s. n.], 1983: 199- 203.
  • 9Manbo M, Usdua K, Okamoto E. Prosy Signature: Delegation of The Power to Sign Messages[J]. IEICE Transactions on Foundations, 1996, 79(9): 1338-1353.
  • 10Lin W D, Jan J K. A Security Personal Learning Tools Using a Proxy Blind Signature Scheme[C]//Proc. ofInternational Conference on Chinese Language Computing. Washington D. C., USA: IEEE Computer Society, 2000: 273-277.

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部