期刊文献+

基于属性的代理签密方案 被引量:2

Attribute-based Proxy-Signcryption Scheme
原文传递
导出
摘要 为了达到群组签密的目的以及使得群组签密具有代理功能,利用双线性配对的特性结构及基于属性的密码体制结构,构建出一个基于属性的代理签密方案。其中,将文件用属性集来标识,私钥由访问控制结构来产生,用来控制签密、代理签密和解签密的权限范围。该方案既保持了基于属性签密的优点,又具有代理签名的功能,且具有公开验证性、强可识别性及强不可否认性。最后,对方案进行了安全性分析。 In order to realize the group signcryption and let it have the proxy signcryption functionality,based on bilinear pairing and attribute-based cryptosystem,an attribute-based proxy-signcryption scheme is proposed.In this scheme,the plaintext is labeled with attribute sets,and the private key is generated by access control structure,thus to control the limits of authority for signcryption,proxy sigcryption or designcryption.This scheme has the advantage of attribute-based signcryption while is of the function of proxy signature.It also has open confirmability,strong identifiability and strong non-repudiation.Finally,this paper gives the security analysis of the proposed scheme.
出处 《通信技术》 2010年第9期147-149,共3页 Communications Technology
关键词 代理签密 双线性配对 基于属性的密码体制 proxy signcryption bilinear pairing attribute-based cryptosystem
  • 相关文献

参考文献6

  • 1MAMBO M, USUDA K, OKAMOTO E. Proxy Signature: Delegation of the Power to Sign Messages[J]. IEICE Trans. Fundamentals, 1996(E79-A):1338- 1353.
  • 2GOYAL V, PANDEYY O, SAHAIZ A. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]. USA: ACM Press, 2006:89-98.
  • 3GUO S O, ZENG Y P. Attribute-based Signature Scheme[C]. USA: IEgg Computer Society, 2008:509-511.
  • 4FLORIAN Hess. Efficient Identity Based Signature Schemes Based on Pairings [C]. Berlin/Heidelberg: Springer, 2003:310-324.
  • 5史妍,潘伟,钟绍春.基于属性的签密方案[J].信息安全与通信保密,2009,31(9):129-131. 被引量:3
  • 6张慧.一种代理签名方案的分析与改进[J].信息安全与通信保密,2009,31(11):74-75. 被引量:2

二级参考文献9

  • 1戴佳筑,杨小虎,董金祥.一种指定接收人的代理签名方案[J].浙江大学学报(工学版),2004,38(11):1422-1425. 被引量:3
  • 2王晓明,陈火炎,符方伟.前向安全的代理签名方案[J].通信学报,2005,26(11):38-42. 被引量:35
  • 3柳菊霞,吴良杰,苏靖枫,付蓉.匿名代理签名方案的研究与改进[J].信息安全与通信保密,2006,28(3):75-77. 被引量:8
  • 4Goyal V, Pandeyy O, Sahaiz A, et al. Attributebased encryption for fine grained access control of encrypted data[C]. In Proceedings of the 13th ACM Conference on Computer and Communications Security, New York: ACM, 2006: 89-98.
  • 5Guo Shanqing, Zeng Yingpei. Attribute based Signature Scheme[C]. In 2008 International Conference on Information Security and Assurance, BUSAN: Information Security and Assurance, 2008:509-511.
  • 6Khader D. Attribute Based Group Signatures[DB/ OL]. [2009-03-02]. http: //eprint.iacr.org/.
  • 7Pirretti M, Traynor P, McDaniel P, et al. Secure Atrribute-Based Systems[C]. In ACM conference on Computer and Communications Security(ACM CCS), New York: ACM, 2006: 99-112.
  • 8Hess F. Efficient identity based signature schemes based on pairings[C]. Berlin: Springer, 2003: 310- 324.
  • 9袁德明.系统中心控制和多方参与的安全盲签名[J].通信技术,2007,40(9):58-60. 被引量:1

共引文献3

同被引文献26

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部