期刊文献+

基于身份的新签密方案 被引量:2

New identity-based signcryption scheme
下载PDF
导出
摘要 为解决目前基于身份的签密方案效率不高的问题,利用双线性对,将公钥密码体制与对称密码体制相结合,提出了一个高效的基于身份的签密方案。在BDH问题及DBDH问题的困难性假设下,运用随机预言模型,证明了方案的安全性。与现有的基于身份的签密方案相比,本方案有较高的效率。 To improve the efficience,this paper proposed a new efficient identity-based signcryption scheme using the bilinear pairings and both the combination of public and private key crypto systems. And it also proved the scheme's security in the random oracle model while assuming the hardness of Bilinear Diffie-Hellman( BDH) problem and Decisional Bilinear Diffie-Hellman( DBDH) problem. Compared with the existing identity-based signcryption scheme,the sheme had high efficiency.
出处 《计算机应用研究》 CSCD 北大核心 2010年第12期4630-4632,4637,共4页 Application Research of Computers
基金 国家教育部科学技术研究重点项目(208148) 甘肃省教育厅重点项目(0801-01)
关键词 签密 基于身份 双线性对 随机预言模型 signcryption identity-based bilinearpairings random oracle model
  • 相关文献

参考文献9

  • 1SHAMIR A.Identity-based cryptosystems and signature schemes[C] //Proc of Cryptology-CRYPTO.Berlin:Springer-Verlag,1984:47-53.
  • 2MALONE-LEE J.Identity based signcryption[R/OL].(2002-07-20).http://eprint.iacr.org.
  • 3LIBERT B,QUISQUATER J.A new identity based signcryption schemes from pairings[C] //Proc of IEEE Information Theory Workshop.Paris:[s.n.] ,2003:155-158.
  • 4CHEN Li-qun,MALONE-LEE J.Improved identity-based signcryption[C] //Proc of Public Key Cryptography'05.Berlin:Springer-Verlag,2005:362-379.
  • 5李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 6李顺,曾超,李军.一种基于身份的签密方案[J].计算机工程,2010,36(8):135-137. 被引量:6
  • 7ZHENG Yu-liang.Signcryption and its application in efficient public key solutions[C] //Proc of the 1st International Workshop on Information Security.1997:291-312.
  • 8ZHENG Yu-liang.Digital signcryption or how to achieve cost(signature & encryption) 《《 (cost(signature)+ cost (encryption))[C] //Proc of the 17th Annual International Cryptology Conference on Advances in Cryptology.Berlin:Springer-Verlag,1997:165-179.
  • 9ZHENG Yu-liang,IMAI H.How to construct effcient signcryption schemes on elliptic curves[J].Information Processing Letters,1998,68(5):227-233.

二级参考文献21

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 3李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 4Zheng Yuliang.Digital Signcryption or How to Achieve Cost (Signature & Encryption)《《(Cost(Signature)+Cost (Encryption))[C]// Proc.of CRYPTO'97.Berlin,Germany:Springer-Verlag,1997.
  • 5Shamir A.Identity-based Cryptosystems and Signature Schemes[C]// Proc.of CRYPTO'84.Berlin,Germay:Springer-Verlag,1984.
  • 6Franklinm B D.Identity-based Encryption from the Weil Pairing[J].SIAM Journal of Computing,2003,32(3):586-615.
  • 7Malone-Lee J.Identity Based Signcryption[EB/OL].(2002-07-19).http://eprint.iacr.org/2002/098.
  • 8Chen Liqun,Malone-Lee J.Improved Identity-based Signcryp-tion[C]//Proc.of PKC'05.Berlin,Germany:Springer-Verlag,2005.
  • 9Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179
  • 10Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81

共引文献76

同被引文献22

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2ZHENG Y L. Digital signcryption or how to achieve cost ( signature & encryption) << cost(signature) + cost(encryption) [ C]// Pro- ceedings of the CRYPTO'97, LNCS 1294. Heidelberg: Springer- Verlag, 1997:165 - 179.
  • 3BARBOSA M, FARSHIM P. Certificateless signcryption[ C]//ASI- ACCS 2008: Proceedings of the ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2008: 369 - 372.
  • 4LIU Z, HU Y, ZHANG X, et al. Certificateless signcryption scheme in the standard model [ J]. Information Sciences, 2010, 180 (3) : 452 -464.
  • 5LI F, KHAN M K. A survey of identity-based signcryption [ J]. IE- TE Technical Review, 2011, 28(3): 265-272.
  • 6DENT A W. Hybrid signcryption schemes with outsider security [ C]// ISC 2005: Proceedings of the 8th International Conference on Information Security. LNCS 3650. Berlin: Springer-Verlag, 2005: 203 -217.
  • 7LI F, SHIRASE M, TAKAGI T. Identity-based hybrid signcryption [ C]// ARES 2009: Proceedings of the Fourth International Conferenee on Availability, Reliability and Security. Washington, DC: IEEE Computer Society, 2009:534 -539.
  • 8LI F G , SHIRASE M , TAKAGI T . Certificateless hybrid signcryption [ C]//ISPEC 2009: Proceedings of the 5th Information Security Practice and Experience Conference, LNCS 5451. Berlin: Springer-Verlag, 2008:112 - 123.
  • 9SELVI S S D, VIVEK S S, RANGAN C P. Certificateless KEM and hybrid signcryptiorl schemes revisited [ C]// ISPEC 2010: Proceedings of the 6th Information Security Practice and Experience, LNCS 6047. Berlin: Springer-Verlag, 2010: 294- 307.
  • 10S1NGH K. Identity based hybrid signcryption revisited [ C ] / / ICITeS 2012: Proceedings of the 2012 International Conference on Information Technology and e-Services. Washington, DC: IEEEComputer Society, 2012:34 -39.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部