期刊文献+

具有代理解签密功能的无证书签密方案 被引量:3

Certificateless Signcryption Scheme with Proxy Unsigncryption
下载PDF
导出
摘要 首先,提出具有代理解签密功能的签密概念.此模型中,原始解签密者把消息分为不同的主题,按照主题把解密权力授予不同的代理人;代理人可以代替原始解签密者解密其授权主题下的密文.其次,给出安全模型并基于无证书公钥密码体制提出一个具体方案.最后,基于Weak-BDH难题证明该方案的安全性. Firstly,this paper gives a new signcryption model,named signcryption with proxy unsigncryption.In this model,the original unsigncrypter divides messages into several subjects and delegates his unsigncryption powers to different proxies.The authorized proxies can directly unsigncrypt ciphertexts for the original unsigncrypter.Secondly,this paper gives the security model and based on certificateless public key cryptography give a concrete scheme.At last,this paper proves its security based on Weak-BDH problem.
作者 于刚 韩文报
出处 《计算机学报》 EI CSCD 北大核心 2011年第7期1291-1299,共9页 Chinese Journal of Computers
基金 国家自然科学基金(61003291) 国家"八六三"高技术研究发展计划项目基金(2009AA01Z417)资助~~
关键词 无证书公钥密码体制 签密 可证安全 代理解签密 certificateless public key cryptography signcryption provable secure proxy unsign-cryption
  • 相关文献

参考文献14

  • 1Al-Riyami S S, Paterson K G. Certificateless public key cryptography//Laih C S. Cryptology-ASIACRYPT 2003. LNCS 2894. Berlin: Springer-Verlag, 200:452-473.
  • 2Zheng Y. Digital signcryption or how to achieve cost (Signature&Encryption)≤Cost (Signature)+Cost (Encryption)//Burton S, Kaliski J. CRYPTO'97. LNCS 1294. Berlin: Springer-Verlag, 1997:165-179.
  • 3Barbosa M, Farshim P. Certificateless signcryption//Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS). New York, USA, 2008:369-372.
  • 4Xie W, Zhang Z. Efficient and provably secure certificateless signcryption from bilinear maps//Proceedings of the 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS). Beijing, China, 2010:558-562.
  • 5Liu Z, Hu Y, Zhang X, Ma H. Certificateless signcryption scheme in the standard model. Information Sciences, 2010, 180(3), 452-464.
  • 6Kushwah P, Lal S. Efficient Generalized Signcryption Schemes. Cryptology ePrint Archive Report 2010/346. Http://eprint, iacr. org/2010/346.
  • 7Mambo M, Okamoto E. Proxy cryptosystem:Delegation of a power to decrypt ciphertexts. IEICE Transactions on Fundaments of Electronics Communications and Computer Science, 1997, E80-A(1):54-63.
  • 8Tzeng S F, Yang C Y, Hwang M S. A nonrepudiable threshold multi-proxy multi signature scheme with shared verification. Future Generation Computer Systems, 2004, 20 (5) : 887-893.
  • 9Wang L, Okamoto L, Mambo M, Okamoto E. A subjectdelegated decryption scheme with "tightly" limited authority//Proceedings of the CSS 2006. Japan, 2006:107-112.
  • 10Gamage C, Leiwo J, Zheng Y. An efficient scheme for secure message transmission using proxy-signcryption//Proceedings of the 22nd Australasian Computer Science Conference. Auckland, 1999:420-431.

二级参考文献11

  • 1纪家慧,李大兴,王明强.来自双线性配对的新的代理多签名、多代理签名和多代理多签名体制[J].计算机学报,2004,27(10):1429-1435. 被引量:21
  • 2李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 3李素娟,张福泰,刘志高.一种改进的多重代理签名方案[J].计算机工程,2006,32(17):210-212. 被引量:5
  • 4Hwang S J,Shi C H.A Simple multi-proxy signature scheme[C]. Taiwan:Proceeding of the 10th National Conference on Information Security,2000:134-138,.
  • 5Al-Riyami S,Paterson K.Certificateless public key cryptography [C]. Advances in Cryptology proceeding of Asiacrypt, Lecture Notes in Computer Science 2894.Berlin:Springer-Verlag,2003: 452-473.
  • 6Li Xiang-xue,Chen Ke-fei,Li Shi-qun.Multi-proxy signature and proxy multi-signature schemes from bilinear pairings [M]. Springer-Verlag,2004:591-595.
  • 7Wang Yan, Gao Feng-xiu, Ma Chuan-gui. A nominative multiproxy signature scheme[J].Journal of Huazhong University of Science,2003,31:205-207.
  • 8Hwang Shin-Jia, Chen Chiu-Chiu.New multi-proxy multi-signature schemes [J]. Applied Mathematics and Comptation, 2004 (147):57-67.
  • 9Xu G S,Gu L Z,YangYX.ID-basedmulti-proxy sequential signature system from bilinear pairing[C].USA:Web Intelligence and Intelligent Agent Technology Workshops, 2007: 315-318.
  • 10祁传达,李溪,金晨辉.基于RSA的门限多重代理多重签名方案[J].计算机工程与设计,2007,28(21):5105-5107. 被引量:11

共引文献4

同被引文献35

  • 1Al - Riyami S S, Paterson K G. Certificateless public key cryptography [ C ]//LNCS 2894 : Advance in Cryptography Asiacrypt 2003. Berlin : Springer Verlag,2003:452 - 473.
  • 2Zheng Y. Digital signcryption or how to achieve cost (Signature&Encryption) ≤cost(Signature) + Cost(Eneryption) [ C ]// Burton S, Kaliski J. CRYPTO97. LNCS 1294. Berlin : Springer - Verlag, 1997 : 165 - 179.
  • 3Yi Mu,Vijay Varadharajan. Distributed Signeryption[ J]. Lecture Notes in Computer Science,2000(1977) :155 -164.
  • 4KWAK D, MOON S. Efficient distributed signcryption scheme as group signcryption[ C ]//In:Applied Crypto- graphy and Network Security( ACNS38 ). LNCS 2846. Berlin : Springer - Verlag,2005:403 - 417.
  • 5KWAK D J, MOON S J, WANG G L, et al. A secure extension of the Kwak - Moon group signcryption scheme [ J ]. Computers & Security ,2006,25 (6) :435 - 444.
  • 6林齐平.基于双线性对的群签密方案[J].韩山示范学院学报,2007,28(6):33-36.
  • 7Shamir A. Identity-based cryptosystems and signature schemes [C] // Proceeding of Crypto' 84. LNCS 196, Berlin: Springer- Verlag, 1984 : 47-53.
  • 8Al-Riyami S S,Paterson K G. Certificateless public key cryptog- raphy[C]//Proceeding of ASIACRYPT 2003. LNCS 2894, Ber- lin: Springer-Verlag, 2003 : 452-473.
  • 9Yang Guo-min, Tan C H. Certificateless cryptography with KGC trust level 3[J]. Theoretical Computer Science, 2011,412 (39).. 5446-5457.
  • 10Barbosa M, Farshim P. Certificateless signcryption [C]//Pro- eeeding of ASIACCS'2008. ACM, 2008:369-372.

引证文献3

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部