期刊文献+

基于身份的同时生效签密体制研究 被引量:2

Identity-based Concurrent Signcryption Scheme
下载PDF
导出
摘要 签密体制能够在一个逻辑步骤内完成数字签名和加密两项功能。某些场合下,通信双方存在利益冲突,同时生效签名体制可以在不需要可信第三方的条件下提供签名交换的公平性。基于此,该文提出同时生效签密概念及其安全模型,并利用双线性对建立了一个基于身份的同时生效签密方案,证明了在BDH问题及Co-CDH是困难的假设下,方案是安全的。 Signcryption is a cryptographic primitive that combines both the function of digital signature and encryption in a logical single step.However,in some occasion there are conflicts of interest between the two entities,so concurrent signature is proposed to ensure fair exchange of the signature without special trusted third party.The notion of concurrent signcryption is defined and the security model is proposed in this paper.And an identity-based concurrent signcryption scheme is established using bilinear based on the framework.The scheme is proved to be secure assuming Bilinear Diffie-Hellman problem and Computational Co-Diffie-Hellman problem are hard in the bilinear context.
出处 《电子与信息学报》 EI CSCD 北大核心 2011年第7期1582-1588,共7页 Journal of Electronics & Information Technology
关键词 签密 同时生效签名 双线性对 随机预言模型 Signcryption Concurrent signature Bilinear pairing Random oracle model
  • 相关文献

参考文献15

  • 1Zheng Y. Digital signcryption or how to achieve cost (signat ure&encryption) < <cost (signature) +cost (encrytion) [C]. Advances in cryptology - CRYPTO '97, Santa Barbara, USA, Aug. 17-21, 1997, LNCS 1294: 165-179.
  • 2Malone-Lee J. Identity based signcryption, http://eprint.iacr. org/2OO2/O98.pdf.
  • 3Chen L and Malone-Lee J. Improved identity-based signcryption [C]. Public Key Cryptography - PKCV05, Les Diablerets, Switzerland, Jan. 23-26, 2005, LNCS 3386: 362-379.
  • 4Li Fagen, Xin Xiang-jun, and Hu Yu-pu. Indentity-based broadcast signcryption [J]. Computer Standards $z Interfaces, 2008, 30(1-2): 89-94.
  • 5Sharmila Deva Selvi S, Sree Vivek S, and Shriram J, et al.. Identity based aggregate signcryption schemes [C]. Indocrypt 2009, New Delhi, India, Dec. 13-16, 2009, LNCS 5922: 378-397.
  • 6Yu Yong, Yang Bo, Sun Ying, and Zhu Sheng-lin. Identity based signcryption scheme without random oracles [J]. Computer Standards & Interfaces, 2009, 31(1): 56-62.
  • 7Zhang J and Geng Q. Cryptoanalysis of two signcryption schemes [C1. Fifth International Conference on Information Assurance and Security, Xi'an, China, Aug. 18-20, 2009: 65-68.
  • 8Hur Jun-beom, Park Cha-nil, and Yoon Hyun-soo. Chosen ciphertext secure authenticated group communication using identity-based signcryption [J]. Computers and Mathematics with Applications, 2010, 60(2): 362-375.
  • 9Chen L, Kudla C, and Paterson K G. Concurrent signatures [C]. Advances in Cryptology-EUROCRYPT 2004, Interlaken, Switzerland, May 2004, LNCS 3027: 287-305.
  • 10Susilo W, Mu Y, and Zhaag F. Perfect concurrent signature schemes [C]. Information and communications security- ICICS 2004, Malaga, Spain, Oct. 2004, LNCS 3269: 14-26.

同被引文献21

  • 1孙琦,朱文余,王标.环Z_n上圆锥曲线和公钥密码协议[J].四川大学学报(自然科学版),2005,42(3):471-478. 被引量:44
  • 2肖龙,王标,孙琦.基于环Z_n上的圆锥曲线数字签名和多重数字签名[J].西安交通大学学报,2006,40(6):648-650. 被引量:14
  • 3李航宇.有限域上的圆锥曲线的数乘运算(英文)[J].信息安全与通信保密,2007,29(8):64-65. 被引量:5
  • 4ZigBee Alliance. ZigBee specifications[EB/OL], http://www. zigbee.org, 2008.
  • 5ZigBee Alliance. ZigBee security specification overview[EB/ OL]. http://www.zigbee.org, 2010.
  • 6Ytlksel E, Nielson H R, and Nielson F. ZigBee-2007 security essentials[C]. Proceedings of the 13th Nordic Workshop on Secure IT Systems, Copenhagen, 2008: 65-82.
  • 7Lee Kyung hwa, Lee Jooh yun, Zhang Bong duk, et al.. An enhanced trust center based authentication in ZigBee networks[C]. Advances in Information Security and Assurance, Lecture Notes in Computer Science, Seoul, 2009, 5576: 471-484.
  • 8Yflksel E, Nielson H R, and Nielson F. A secure key establishment protocol for ZigBee wireless sensor networks[J]. Computer Journal, 2011, 54(4): 589-601.
  • 9Blaser M. Industrial-strength security for ZigBee: the case forpublic-key cryptography[J]. Embedded Computing Design, 2005, 3(3): 48-52.
  • 10Oliveira L B, Dahab R, Lopez J, et al.. Identity-based encryption for sensor networks[C]. Proceedings of the 5th Annual IEEE International Conference on PerCom Workshops, New York, 2007: 290-294.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部