期刊文献+

高效的基于身份的代理签密方案 被引量:6

Efficient identity-based proxy signcryption scheme
下载PDF
导出
摘要 代理签密使原始签密人可以将其签密权力委托给代理签密人,然后代理签密人代表原始签密人签密指定的消息。为了更好地实现代理签密的公开验证性和前向安全性,利用椭圆曲线上双线性对提出一个基于身份的代理签密方案。分析表明,在ECDLP问题和CDH问题是困难的假设下,该方案是安全的。方案既保持了基于身份签密的优点,又具有代理签名的功能,只有指定的接收者才能从密文中恢复消息。并且同时具有前向安全性和公开验证性,适合于应用。 Proxy signcryption is useful when an original signcrypter needs to delegate his or her signcrypting capability to a signcrypter,and the proxy signcrypt messages on behalf of the original signcrypter.To solve the problem of no forward security and public verifiability,this paper proposed an identity-based proxy signcryption scheme from bilinear pairings.Analysis shows that the scheme is secury,assuming that ECDLP and GDH problem are hard.The new scheme not only has the function of proxy signature scheme,but also has the advantage of identity based signcryption scheme.Only the intended recipient can recover the plaintext from the ciphertext.What' s more,the scheme provided forward security and public verifiability and it is more propitious to appliications in society.
出处 《计算机应用研究》 CSCD 北大核心 2011年第7期2694-2696,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(61071116) 国家科技重大专项(2009ZX03001-004) 重庆市科委自然科学基金资助项目(CSTC 2010BB2407) 信号与信息处理重庆市市级重点实验室建设项目(CSTC 2009CA2003)
关键词 代理签密 基于身份 双线性对 指定的接收者 前向安全性 公开验证性 proxy signcryption identity-based bilinear pairing the intended recipient forward security public verifiability
  • 相关文献

参考文献3

二级参考文献24

  • 1张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 2Shamir A. Identity-based Cryptosystems and Signature Schemes[C]// Proc. of CRYPTO'84. Berlin, Germany: Springer-Verlag, 1984.
  • 3Boneh D, Franklin M. Identity-based Encryption from the WeilPairing[C]//Proc. of CRYPTO'01. Berlin, Germany: Springer- Verlag, 2001.
  • 4Mambo M, Usuda K, Okamoto E. Proxy Signatures: Delegation of the Power to Sign Messages[J]. IEICE Trans. on Fundam, 1996, E79-A(9): 1338-1354.
  • 5Lee B, Kim H, Kim K. Strong Proxy Signature and Its Application[C]//Proceedings of SCIS'01. Oiso, Japan: [s. n.], 2001.
  • 6Gamage C, Leiwo J, Zheng Yuliang. An Efficient Scheme for Secure Message Transmission Using Proxy-signcryption[C]//Proc. of the 22th Australasian Computer Science. [S. l.]: Springer-Verlag, 1999.
  • 7Li Xiangxue, Chen Kefei. Identity-based Proxy-signcryption Scheme from Pairings[C]//Proceedings of SCC'04. Los Alamitos, USA: IEEE Computer Society Press, 2004: 494-497.
  • 8Wang Meng, Li Hui, Liu Zhijing. Efficient Identity-based Proxysigncryption Schemes with Forward Security and Public Verifiability[C]//Proc. of the 3rd International Conference on Networking and Mobile Computing. [S. l.]: Springer-Verlag, 2005.
  • 9Duan Shanshan, Cao Zhenfu, Zhou Yuan. Secure Delegation-by- warrant ID-based Proxy Signcryption Scheme[C]//Proc. of CIS'05. [S.l.]: Springer-Verlag, 2005.
  • 10Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Transactions on Fundamentals,1996,E792A (9):1338-1353.

共引文献18

同被引文献47

引证文献6

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部