期刊文献+

一种新的无证书广播签密方案 被引量:1

A new certificateless broadcast signcryption
下载PDF
导出
摘要 为了解决现有签密方案仅能够实现一对一签密与解签密的局限性,兼顾其实用性和安全性,考虑到签密方案具有效率高而传输与计算成本低的特点,结合无证书公钥体制的优势,引入了能抵抗"恶意但被动"的KGC(密钥生成中心)攻击的无证书广播签密的形式化安全模型,并提出一种新的无证书广播签密方案.该方案建立在标准模型下,能抵抗"恶意但被动"的KGC攻击,并且依赖于DBDH假设可以证明是IDN-CCA2安全的,同时依赖于CDH假设是EUF-CMA安全的,具有较高的安全性和实用性. Considering the characteristics of signcryption schemes with high efficiency and low computational and transmissional cost,along with the advantages of certificateless public key cryptography,a formal security model for certificateless broadcast signcryption secure against malicious-but-passive key generation center(KGC) attacks was introduced.Also,a new certificateless broadcast signcryption scheme was proposed to control the limitations of one-to-one transmission.This scheme was proven not only to be IDN-CCA2 secure under the decisional bilinear Diffie-Hellman(DBDH) intractability assumption without using the random oracles,but also to be existentially unforgeable under the computational Diffie-Hellman(CDH) intractability assumption.Furthermore,performance analysis shows that the proposed scheme is efficient and practical.
作者 孙瑾 胡予濮
出处 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2011年第5期637-642,共6页 Journal of Harbin Engineering University
基金 国家973基金资助项目(2007CB311201) 国家自然科学基金资助项目(60970119)
关键词 广播签密 标准模型 可证明安全 无证书公钥系统 恶意但被动KGC攻击 broadcast signcryption standard model provably secure certificateless public key cryptography malicious-but-passive key generation center attacks
  • 相关文献

参考文献16

  • 1ZHENG Y. Digital signcryption or how to achieve cost ( sig- nature or encryption) cost (signature) + cost (encryption) [J]. LNCS. 1294,1997: 291-312.
  • 2AN J H, DODIS Y, RABIN T. On the security of joint signture and encryption[ C]//Advances in cryptology Eurocrypt 2002. Berlin: Springer-Verlag, 2002:83-107.
  • 3MALONE-LEE J. Identity based signcryption [ EB/OL]. [2002-7-19 ]. Cryptologry ePrint Archive, Report 2002/ 098. http://eprint, iacr. org/2002/098.
  • 4CHEN L, MALONE-LEE J. Improved identity-based sign- cryp- tion [ C l// Proc of the 8th Int Workshop on Theory and Practice in Public Key Cryptography 2005, LNCS 3386. Berlin : Springer-Verlag, 2005:362-379.
  • 5LIBERT B, QUISQUATER J. New identity based signcryption schemes from pairings[ C ]//Proceedings of the 2003 IEEE In- formation Theory Workshop. Pairs, France, 2003:155-158.
  • 6FIAT A, NAOR M. Boradcast eneryption[ C ]//Proceedings of the 13th annual international cryptology conference on Advances in cryptology. New York: Springer-Verlag, 1993: 480-491.
  • 7ZHAN L Y, HU Y P, MU N B. An Identity-based broadcast encryption protocol for ad hoc networks [ J]. The 9th Inter- nation Conference for Young Computer Scienilsts, 2009: 1619-1623.
  • 8DELERABLEE C, PAILLIER P. Fully collusion secure dy- namic broadcast encryption with constant-size ciphertexts or decryption keys [ C ]//Proceedings of the first International Conference on Pairing-based Cryptography. Tokyo, Japan, 2007:39-59.
  • 9BARBOSA M, FARSHIM P. Efficient identity-based key encapsulation to multiple parties[ C ]//Proceedings of Cryp- tography and coding, [ s. 1. ], 2005:428-441.
  • 10ELERABLEE C. Identity-based broadcast encryption with constant size ciphertexts and private keys [ C ]// Proceedings of the Advances in Crypotology 13th Interna- tional Conference on Theory and Application of Cryptology and Information Security. [ s. 1. ], 2007 : 200-215.

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部