期刊文献+

基于多接收者签密算法的门限密钥更新协议 被引量:3

Threshold rekeying protocol based on multi-receiver signcryption algorithm
下载PDF
导出
摘要 提出了一个基于身份的多消息多接收者的签密算法,新算法可同时为多个接收者对多个消息进行签密。根据此特点,提出了适用于Ad Hoc网络的基于多接收者签密算法的门限密钥更新协议,并对新算法和协议进行了分析。分析表明,该算法具备机密性和可认证性,且具有较高的性能;密钥更新协议不但具备算法的特性,而且还可以抵抗共谋攻击。 An ID-based multi-message and multi-receiver signcryption algorithm was proposed,which could simultaneously signcrypt lots of messages for lots of receivers.Based on it,a threshold rekeying protocol was proposed to be applied in Ad Hoc networks,and the new algorithm and protocol were analyzed.The analysis indicates that the algorithm achieves authenticity and confidentiality while being of high efficiency,and that the rekeying protocol not only possesses the characteristics of the mentioned algorithm,but also can resist collusion attacks.
出处 《计算机应用》 CSCD 北大核心 2011年第2期507-510,共4页 journal of Computer Applications
关键词 ADHOC网络 密钥更新 签密 基于身份 双线性对 门限共享 Ad Hoc network rekeying signcryption ID-based bilinear pairing threshold sharing
  • 相关文献

参考文献15

  • 1ZHENG Y L . Digital signcryption or how to achieve cost (signature&encryption) <cost(signature) + cost(encryption) [ EB/ OL]. [ 2010 - 05 - 10]. http://citeseerx. ist. psu. edu/viewdoc/ download?doi = 10.1.1. 109. 7036&rep = repl &type = pdf.
  • 2ZHENG Y. Signcryption and its application in efficient public key solutions [ C] // ISW'97: Information Security Workshop. Berlin: Springer-Verlag, 1997:291 -312.
  • 3MALONE-LEE J. Identity based signcryption [EB/OL]. [ 2010 - 05 - 10]. http://eprint. iacr. org/2002/098.
  • 4CHEN L, MALONE-LEE J. hnproved identity-based signcryption [ M]. Berlin: Springer-Verlag, 2005:362 - 379.
  • 5LIBERT B, QUISQUATER J J. A new identity based signcryption schemes from pairings [C]// IEEE Information Theory Workshop. Washington, DC: IEEE Compnter Society, 2003:155 - 158.
  • 6李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 7LI FAGEN, HU YUPU, ZHANG CHUANRONG. An identity-based signcryption scheme for multi-domain Ad Hoc networks[ C]// Applied Crytography and Network Security, LNCS 4521. Berlin: Springer-Verlag, 2007:373 -384.
  • 8KIM H, SONG J, YOON H. A practical approach of ID-based cryp- to-system in Ad Hoc networks[J]. Wirelass Communications and Mobile Computing, 2007, 7(7) : 909 - 917.
  • 9DENG H, AGRAWAL D P. TIDS: Threshold and identity-based security scheme for wireless Ad Hoc networks[J]. Ad Hoc Networks, 2004, 2(3): 291-307.
  • 10LI FAGEN, WEI DAWEI, KOU HONGZHAO. Identity-based and threshold key management in mobile Ad Hoc networks[C]// International Conference on Wireless Communications, Networking and Mobile Computing 2006. Wuhan: IEEE, 2006:1-4.

二级参考文献15

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:101
  • 3Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179
  • 4Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81
  • 5Pang X. , Tan K. L. , Wang Y. , Ren J.. A secure agent-mediated payment protocol. In: Deng R. H. , Qing S. , Bao F. ,Zhou J. eds.. Information and Communications Security-ICICS 2002, Lecture Notes in Computer Science 2513. Berlin:Springer-Verlag, 2002, 422-433
  • 6Shamir A.. Identity-based cryptosystems and signature schemes. In: Blakley G. R. , Chaum D. eds.. Advances in Cryptology-CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984, 47-53
  • 7Boneh D. , Franklin M.. Identity-based encryption from the Weil pairing. In: Kilian J. ed.. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001, 213-229
  • 8Malone-Lee J.. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, IACR, 2002
  • 9Libert B. , Quisquater J.. A new identity based signcryption schemes from pairings. In: Proceeding of the 2003 IEEE Information Theory Workshop, Paris, France, 2003, 155-158
  • 10Nalla D., Reddy K. C.. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report2003/066, IACR, 2003

共引文献72

同被引文献33

  • 1程月波,金荣洪,耿军平,刘波.平流层通信系统的收发链路性能研究[J].电波科学学报,2005,20(5):666-670. 被引量:6
  • 2李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 3Zuo Wei-ping. An ID-Based Proxy Multi-signcryption Scheme from Pairings[C]// Proceedings of 2010 International Conferen- ce on Multimedia Information Networking and Security. Wa- shington, DC, USA: IEEE Computer Society, 2010: 403-405.
  • 4Li Fa-gen, Yu Yong. An Efficient and Provably Secure ID-Based Threshold Signcryption Seheme[C]//Proceedings of 2008 Inter- national Conference on Communications, Circuits and Systems. Berlin: Springer-Verlag, 2008 : 488-492.
  • 5Kirtane V, Rangan C P. RSA-TBOS Signcryption with Proxy Re-encryption[C]//Proceedings of the 8th ACM Workshop on Digital Rights Management. NewYork, NY, USA: ACM, 2008: 59-66.
  • 6Chandrasekar S, A.mbika K, Rangan P C. Signcryption with Proxy Re-encryption [EB/OL]. http://eprint, iacr. org/2008/ 276,2011-10-05.
  • 7Wang Cai-fen, Cao Xiao-jun. An Improved Signcryption with Proxy Re-encryption and Its Application [C]//Proceedings of 7th International Conference on Computational Intelligence and Security. Washington,DC,USA: IEEE Computer Society, 2011 : 886-890.
  • 8Wang Hui-ge,Wang Cai-fen,Cao Hao. ID-Based Proxy Re-sign- cryption Scheme[C]//Proceedings of 2011 IEEE International Conference on Computer Science and Automation Engineering. Washington, DC, USA: IEEE Computer Society, 2011 : 317-321.
  • 9Duan Shan-shan, Cao Zhen-fu. Efficient and provably secure multi-receiver identity-based signcryption[C]//Proceedings of the 11th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2006 : 195-206.
  • 10Pointcheval D, Stem J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13 (3): 361-396.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部