期刊文献+

无证书体制下的多接收者签密密钥封装机制 被引量:4

Certificateless Signcryption KEM to Multiple Recipients
下载PDF
导出
摘要 无证书签密密钥封装机制(CLSC-KEM)与数据封装机制共同构成无证书混合签密方案。该文提出一个新的概念:无证书体制下的多接收者签密密钥封装机制(mCLSC-KEM)。给出了mCLSC-KEM的定义以及安全模型,并构造了一个具体的方案。该方案比一般性构造(对每个接收者分别运行CLSC-KEM)高效很多,其密钥封装仅需计算1个双线性对,且对应的数据封装仅需运行1次对称加密,而一般性构造需计算n个双线性对和n次数据封装(设n个接收者)。在随机预言模型下,基于Gap双线性Diffie-Hellman问题,该文的方案是可证明安全的。 Certificateless signcryption key encapsulation mechanism (CLSC-KEM),combined with a data encapsulation mechanism,is used to construct certificateless hybrid signcryption. This paper introduces a new concept:certificateless signcryption KEM to multiple recipients (mCLSC-KEM). The definition and the security models are given for this new primitive,and a concrete mCLSC-KEM scheme is presented. This scheme is much more efficient than the generic construction,for it needs to compute only one pairing during key encapsulation and one symmetric encryption during data encapsulation,in contrast to n pairings and n symmetric encryptions for the generic scheme. Our scheme is provably secure in the random oracle model,under the hardness assumption of the Gap-BDH problem.
出处 《电子与信息学报》 EI CSCD 北大核心 2010年第9期2249-2252,共4页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60772136) 国家863计划项目(2007AA01Z435) 中国科学院"九五"重大项目(2008BAH22B03 2007BAH08B01) 国家111项目(B08038)资助课题
关键词 密码学 无证书 签密密钥封装机制 多接收者 双线性对 可证明安全 随机预言模型 Cryptography Certificateless Signcryption key encapsulation mechanism Multiple recipients Bilinear pairing Provably secure Random oracle model
  • 相关文献

参考文献18

  • 1Al-Riyami S S and Paterson K G.Certificateless public key cryptography[C].ASIACRYPT 2003,Berlin:Springer-Verlag,2003,LNCS 2894:452-473.
  • 2Shamir A.Identity-based cryptosystems and signature schemes[C].CRYPTO 1984,Berlin:Springer-Verlag,1984,LNCS 196:47-53.
  • 3Boneh D and Franklin M.Identity-based encryption from the Weil pairing[C].CRYPTO 2001,Berlin:Springer-Verlag,2001,LNCS 2139:213-229.
  • 4Zheng Y.Digital signcryption or how to achieve cost (Signature & encryption) 《《 cost(Signature) + cost (Encryption)[C].CRYPTO 1997,Berlin:Springer-Verlag,1997,LNCS 1294:165-179.
  • 5An JH,Dodis Y,and Rabin T.On the security of joint signature and encryption[C].EUROCRYPT 2002,Berlin:Springer-Verlag,2002,LNCS 2332:83-107.
  • 6Boyen X.Multipurpose identity-based signcryption:a swiss army knife for identity-based cryptography[C].Cryptology -CRYPTO 2003,Berlin:Springer-Verlag,2003,LNCS 2729:383-399.
  • 7Barreto PSLM,Libert B,McCullagh N,and Quisquater J J.Efficient and provably-secure identity-based signatures and signcryption from bilinear maps[C].Asiacrypt 2005,Berlin:Springer-Verlag,2005,LNCS 3788:515-532.
  • 8李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 9Barbosa M and Farshim P.Certificateless signcryption[C].ACM Symposium on Information,Computer and Communications Security-ASIACCS 2008,Tokyo,Japan,2008:369-372.
  • 10Wu Chen-huang and Chen Zhi-xiong.A new efficient certificateless signcryption scheme[C].International Symposium on Information Science and Engieering,Shanghai,China,IEEE Computer Society,2008:661-664.

二级参考文献15

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 3Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179
  • 4Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81
  • 5Pang X. , Tan K. L. , Wang Y. , Ren J.. A secure agent-mediated payment protocol. In: Deng R. H. , Qing S. , Bao F. ,Zhou J. eds.. Information and Communications Security-ICICS 2002, Lecture Notes in Computer Science 2513. Berlin:Springer-Verlag, 2002, 422-433
  • 6Shamir A.. Identity-based cryptosystems and signature schemes. In: Blakley G. R. , Chaum D. eds.. Advances in Cryptology-CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984, 47-53
  • 7Boneh D. , Franklin M.. Identity-based encryption from the Weil pairing. In: Kilian J. ed.. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001, 213-229
  • 8Malone-Lee J.. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, IACR, 2002
  • 9Libert B. , Quisquater J.. A new identity based signcryption schemes from pairings. In: Proceeding of the 2003 IEEE Information Theory Workshop, Paris, France, 2003, 155-158
  • 10Nalla D., Reddy K. C.. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report2003/066, IACR, 2003

共引文献72

同被引文献23

  • 1Zheng Yuliang. Digital signcryption or how to achieve cost (signature&encryption) <cost ( signature ) + cost ( encryption ). Ad- vances in Cryptology, 1997 ; 1294 : 165-179.
  • 2Barbosa M. Farshim P. Certificateless signcryption. ACM Symposium on Information, Computer and Communications Securyty-ASIACCS, 2008:369-372.
  • 3Cramer R, Shoup V. Design and analysis of practical public-key en- cryption schemes secure against adaptive chosen ciphertext attack. SI- AM Journal on Computin,2004:167-226.
  • 4Dent A W. A designer' s guide to KEMs. Cryptography and Coding, LNCS,2003 ; 2898:133-151.
  • 5BjOrstad T E. Hybrid signcryption. Practical Signcryption, 2010; 121 -147.
  • 6Li Fagen. Certificateless hybrid signcryption, information security practice and experience. LNCS, 2009 ;5451 : 112-123.
  • 7Selvi S S D, Vivek S S, Rangan C P. Certificateless KEM and hybrid signcryption schemes revisited. Information Security Practice and Ex- perience, LN CS, 2010 ; 6047 : 294-307.
  • 8Douglas R S. Cryptography Theory and Practice. CRC Press,2002.
  • 9Ronald C, Victor S. A practical public key cryptosystem provable secure against adaptive chosen ciphertext attack. Crypto, LNCS, 1998 ; 1462 : 13-25.
  • 10Smart N P. Efficient key encapsulation to multiple parties. Security- In Communication Networks. LNCS, Springer-Verlag, 2005 ; 3352 : 208-219.

引证文献4

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部