期刊文献+

高效无证书混合签密 被引量:15

Efficient Certificateless Hybrid Signcryption
下载PDF
导出
摘要 无证书混合签密能够处理无证书体制下任意长度的消息,而普通的无证书签密则不能处理.指出Selvi等人提出的攻击是不成立的,并构造了一个新的无证书混合签密方案.与现有方案相比,该方案具有密文长度短、计算速度快的优点,因此更适用于带宽窄、计算资源少的通信环境,如ad hoc网络.在随机预言模型和双线性Diffie-Hellman困难性假设条件下,该方案可证明是安全的. Certificateless hybrid signcryption can handle messages of arbitrary length while the conventional certificateless signcryption cannot. This paper demonstrates that the attacks presented by Selvi, et al., do not hold, and proposes a new certificateless hybrid signcryption scheme, which outperforms all the existing schemes on both bandwidth usage and computation efficiency. Hence, this scheme is more suitable for the applications with a narrow bandwidth and limited computation resources such as ad hoc networks. This scheme has been proven to be secure in the random oracle model, under the bilinear Diffie-Hellman assumption.
作者 孙银霞 李晖
出处 《软件学报》 EI CSCD 北大核心 2011年第7期1690-1698,共9页 Journal of Software
基金 国家自然科学基金(60772136) 国家高技术研究发展计划(863)(2007AA01Z435) 国家科技支撑计划(2008BAH22B03 2007BAH08B01) 国家"111"项目(B08038)
关键词 无证书混合签密 无证书签密密钥封装机制 数据封装机制 可认证性 机密性 双线性Diffie-Hellman 随机预言模型 certificateless hybrid signcryption certificateless signcryption key encapsulation mechanism DEM(data encapsulation mechanism) authenticity confid- entiality bilinear Diffie-Hellman randomoracle model
  • 相关文献

参考文献1

二级参考文献15

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 3Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179
  • 4Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81
  • 5Pang X. , Tan K. L. , Wang Y. , Ren J.. A secure agent-mediated payment protocol. In: Deng R. H. , Qing S. , Bao F. ,Zhou J. eds.. Information and Communications Security-ICICS 2002, Lecture Notes in Computer Science 2513. Berlin:Springer-Verlag, 2002, 422-433
  • 6Shamir A.. Identity-based cryptosystems and signature schemes. In: Blakley G. R. , Chaum D. eds.. Advances in Cryptology-CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984, 47-53
  • 7Boneh D. , Franklin M.. Identity-based encryption from the Weil pairing. In: Kilian J. ed.. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001, 213-229
  • 8Malone-Lee J.. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, IACR, 2002
  • 9Libert B. , Quisquater J.. A new identity based signcryption schemes from pairings. In: Proceeding of the 2003 IEEE Information Theory Workshop, Paris, France, 2003, 155-158
  • 10Nalla D., Reddy K. C.. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report2003/066, IACR, 2003

共引文献72

同被引文献145

引证文献15

二级引证文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部