期刊文献+

不使用双线性对的无证书签密方案 被引量:47

Certificateless Signcryption Scheme Without Pairing
下载PDF
导出
摘要 签密能够在一个合理的逻辑步骤内同时完成对信息的数字签名和公钥加密,其计算量和通信成本均大幅低于传统的"先签名后加密",基于离散对数提出了一种不使用双线性对的无证书签密方案,并在随机预言机模型下给出了安全性证明,在CDH和DL假设下,该方案被证明是安全的,此外该方案还具有公开验证、前向安全和不可否认等安全属性.在计算效率方面,该方案仅需3次指数运算,与其他无证书签密方案相比,不进行对运算效率更高. Signcryption is a cryptographic primitive that fulfills both the functions of the public key digital signature and the public key encryption in a logical single step, at a cost in the computational and communication significantly lower than that required by the traditional "signature then encryption" approach. Based on discrete logarithm, a new certificateless signcryption scheme without using the bilinear pairings is presented in this paper, and the method to build certificateless signcryption scheme without using the bilinear pairings seems to have never been addressed in the existing literatures. The security analysis of the proposed scheme in the implementation plan with the random oracle model is presented in this paper, and the results show that the proposed scheme is secure on the assumption that the compute Diffle-Hellman problem and the discrete logarithm problem are the difficult problems. The proposed scheme also has the security properties of confidentiality, non-forgeability, publicly verifiability, non-repudiation and perfect forward security, etc. Moreover, the implementation of the proposed scheme only requires three times exponent operations and without any bilinear pairing operation. Compared with other existing certificateless signcryption schemes in the computational complexity, the proposed scheme is more efficient.
出处 《计算机研究与发展》 EI CSCD 北大核心 2010年第9期1587-1594,共8页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60772136 60803151) 国家"八六三"高技术研究发展计划基金项目(2007AA01Z435) 高等学校学科创新引智计划基金项目(B08038)
关键词 无证书 签密 离散对数 双线性对 随机预言机模型 certificateless signcryption discrete logarithm pairing random oracle model
  • 相关文献

参考文献10

  • 1Zheng Yuliang.Digital signcryption or how to achieve cost (signature and encryption) 《《 cost (signature) + cost (encryption)[G] //LNCS1294,CRYPTO'1997.Berlin:Springer,1997:165-179.
  • 2AI-Riyami S S,Paterson K G.Certificateless public key cryptography[G] //LNCS2894:Asiacrypt'03.Berlin!Springer,2003:452-473.
  • 3Shamir A.Identity-based cryptosystems and signature schemes[G] //LNCS196:CRYPTO'1984.Berlin; Springer,1984:47-53.
  • 4Aranha D,Castro R,Lopez J,et al.Efficient certificateless signcryption[EB/OL].(2008-09-05)[2009-03-21].http.//sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_01_resumo.pdf.
  • 5Wu Chenhuang,Chen Zhixiong.A new efficient certificateless signcryption scheme[C] //Proc of ISISE'08.Piscataway,NJ:IEEE,2008:661-664.
  • 6Barreto P L,Deusajute A M,Cruz E C,et al.Toward efficient certificateless signcryption from (and without)bilinear pairings[EB/OL].(2008-09-05)[2009-03-21].http://sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_03_artigo.pdf.
  • 7Sharmila D S,Vivek S S,Pandu R C.On the security of certificateless signcryption schemes[EB/OL].(2009-03-05)[2009-06-12].Http://eprint.Iacr.Org/2009/298.Pdf.
  • 8Barbosa M,Farshim P.Certificateless signcryption[C] //Proc of ASIACCS'2008.New York:ACM,2008:369-372.
  • 9Li Fagen,Masaaki S,Tsuyoshi T.Certificateless hybrid signcryption[G] //LNCS5451,Proc of ISPEC2009.Berlin,Springer,2009:112-123.
  • 10赖欣,黄晓芳,何大可.基于身份的高效签密密钥封装方案[J].计算机研究与发展,2009,46(5):857-863. 被引量:4

二级参考文献19

  • 1Zheng Y. Digital signcryption or how to achieve cost (Signature & Encryption ) cost ( Signature ) + cost (Encryption) [G]//LNCS 1294 : Advances in Cryptology- Crypto'97. Berlin: Springer, 1997:165-179
  • 2Zheng Y. Identification, signature and signcryption using high order residues modulo an RSA composite [C] HLNCS 1992: Proc of PKC'01. Berlin: Springer, 2001:48-63
  • 3Zheng Y. Signcryption and its applications in efficient public key solutions [C] //LNCS 1397: Proc of ISW'97. Berlin: Springer, 1998:291-312
  • 4Yum B H, Lee P J. New signcryption schemes based on KCDSA [C] //LNCS 2288: Proc of ICISC'01. Berlin: Springer, 2001:305-317
  • 5Cramer R, Shoup V. Design and analysis of practical publickey eneryption schemes secure against adaptive chosen eiphertext attack [J]. SIAM Journal on Computing, 2003, 33(1): 167-226
  • 6Dent A W. Hybrid signcryption schemes with outsider security [C] //LNCS 3650: Proc of ISC 2005. Berlin: Springer, 2005:203-217
  • 7Shamir A. Identity-based cryptosystems and signature schemes [C] //LNCS 196: Advances in Cryptology- Proceedings of CRYPTO'84. Berlin: Springer, 1985:48-53
  • 8Boneh D, Franklin M. Identity based eneryption from the weil pairing [C]//LNCS 2139: Advances in Cryptology Crypto 2001. Berlin: Springer, 2001:213-229
  • 9Lee J M. Identity based signcryption [OL]. [2002-07-19]. http://eprint. iacr. org/2002/098
  • 10Libert 15, Quisquater J J. New identity based signcryption schemes from pairings [OL]. [2002-02-04]. http://eprint. iacr. org/2003/023

共引文献3

同被引文献342

引证文献47

二级引证文献126

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部