期刊文献+

一种适于Ad hoc网络恶意节点处理的多接收者签密算法 被引量:3

Multi-recipient Signcryption Algorithm for Dealing with Malicious Nodes of Ad hoc Networks
下载PDF
导出
摘要 基于身份的多接收者签密算法是基于身份签密算法的扩展,是近来研究的热点。首先基于双线性对提出一个基于身份的多接收者签密算法,并对其安全性和效率进行了分析和比较;结果表明:在随机预言机模型下,该算法是可被证明安全的,而且其计算量和传输量小、效率高,特别适合Ad hoc网络的安全通信。最后,以处理Ad hoc网络中恶意节点为例,阐述了将基于身份的多接收者签密算法用于Ad hoc网络安全通信的方法。同时,这种签密算法的提出能更好地满足实际应用的高安全需求,具有一定应用价值。 Identity-based multi-recipient signcryption(IDMRSC) is an extension of identity-based signcryttion.At first,a new IDMRSC algorithm is proposed based on bilinear pairings and its security and efficiency are analyzed.The result shows that the algorithm is provable secure in the random oracle model.Furthermore,the algorithm is significantly efficient and of low computation cost and communication overhead,and is very suitable for secure communication in Ad hoc networks.Finally,the method of using IDMRSC algorithm to deal with malicious nodes in Ad hoc networks is expounded.This IDMRSC algorithm can meet the high level secure requirement in practical application and therefore,is of a certain practical value in application.
出处 《空军工程大学学报(自然科学版)》 CSCD 北大核心 2011年第1期68-72,共5页 Journal of Air Force Engineering University(Natural Science Edition)
基金 国家自然科学基金资助项目(60873233) 陕西省科技攻关基金资助项目(2008-k04-21)
关键词 Ad HOC网络 多接收者签密 可证明安全 基于身份 双线性对 Ad hoc networks multi-recipient signcryption provable security identity-based bilinear pairing
  • 相关文献

参考文献8

  • 1陈林星,曾曦,曹毅.移动ad hoc网络[M].北京:电子工业出版社,2006.
  • 2Du H Z,Wen Q Y.An efficient identity-based multi-recipient signcrypytion scheme[J].Journal of Shenzhen university science and engineering,2009,26(2):127-132.
  • 3Libert B,Quisqusater J.A new identity based signcryption schemes from pairings[C] //2003 IEEE information theory workshop.Paris:IEEE press,2003:155-158.
  • 4张串绒,张玉清.基于身份的前向安全和可公开验证签密方案[J].空军工程大学学报(自然科学版),2009,10(3):78-81. 被引量:5
  • 5Florian,Hess.Efficient identity based signature schemes based on pairings[J].Computer science,2003,2595:310-324.
  • 6Sherman S W,Chow S M,Lucas C K,et al.Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity[C] //Information security and cryptology ICISC 2003,LNCS 2971.Berlin:Springer-verlag,2004:352-369.
  • 7李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 8李光松,韩文报.分簇Ad Hoc网络的密钥管理[J].计算机科学,2006,33(2):79-82. 被引量:6

二级参考文献33

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:100
  • 3Bao F,Deng R H.A Signcryption Scheme with Signature Directly Verifiable by Public key{C]//Proc of PKC'98,LNCS 1431.Berlin:Springer,1998:55-59.
  • 4Jung H Y,Chang K S,Lee D H.Signcryption Schemes with Forward Secrecy[C]//Proceeding of WISA.Korea:[s.n.]2001:403-475.
  • 5Jung H Y,Lee D H,Lim J I,et al.Chang,Signcryption Schemes with Forward Secrecy.[C/OL] Proc.of WISA'01,(2001-04-02)[2005-12-08]http://cist.korea.ac.kr/Tr/TR016.
  • 6Shin Jun-Bum,Lee Kwangsu,Shim Kyungah-New DSA-verifiable Signcryption Schemes[C]//Information Security and Cryptology-ICISC 2002,5th International Conference.Berlin:Springer Verlag,2002:28-29.
  • 7Libert B,Quisquater J J.New Identity-based Signcryption Schemes from Pairings[C]//IEEE Information Theory Workshop.Berlin:Springer Verlag,2003:155-158.
  • 8Shamir A.Identity Based Cryptosystems and Signature Schemes[C]//Cryptology-Crypto' 84,LNCS 0196.Berlin:Springer Verlag,1984:47-53.
  • 9Menezes A J.Elliptic Curve Public Key Cryptosystems[M].Kluwer Academic Publishers,1993.
  • 10J Malone-Lee.Identity Based Signcryption[Eb/OL].[2004-05-12]http://eprint.iacr.org/2002/098/.

共引文献94

同被引文献41

  • 1李梅,李大兴.基于Tate对的指定多接收者签密方案[J].山东大学学报(工学版),2006,36(3):43-45. 被引量:5
  • 2张串绒,肖国镇.基于签密技术的可认证密钥协商协议[J].空军工程大学学报(自然科学版),2006,7(6):65-67. 被引量:4
  • 3ZHENG Yu-liang. Digital signcryption or how to achieve cost ( signature & encryption) << cost ( signature) + cost ( encryption) [ C]// Proc of Crypto. Berlin; Springer-Verlag, 1997 : 165-179.
  • 4BAEK J,STEINFELD R, ZHENG Yu-liang. Formal proofs for the security of signcryption [ C ]//Proc of PKC. Berlin: Springer-Verlag, 2002:80-98.
  • 5BOYEN X. Multipurpose identity-based signcryption: a Swiss army knife for identity-based cryptography [ C ] //Proc of Crypto. Berlin : Springer-Verlag, 2003 : 383-399.
  • 6LIBERT B, QUISQUATER J J. Efficient signcryption with key privacy from gap Diffie-Hellman groups [ C ]//Proc of PKC. Berlin ; Springer-Verlag, 2004 ;187-200.
  • 7TAN C H. On the security of signcryption scheme with key privacy [J]. IEICE Trans on Fundamentals, 2005, E88-A (4 ) : 1093-1095.
  • 8TAN C H. Analysis of improved signcryption scheme with key privacy[J]. Information Processing Letters,2006,99(4) :135-13B.
  • 9LI C K, YANG Guo-min, WONG D S, e( al. An efficient signcryption scheme with key privacy [ C]//Proc of EuroPKI. Berlin : Springer-Verlag,2007 :78-93.
  • 10YU Gang, YANG Hong-zhi, FAN Shu-qin, et al. Efficient certifi-cateless signcryption scheme from Weil pairing [ J ]. Journal Of Networks,2011,6(9) :1280-1287.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部