期刊文献+

无双线性配对的无证书签密方案 被引量:59

Certificateless Signcryption Scheme Without Bilinear Pairing
下载PDF
导出
摘要 近几年,仅提出了6个无证书签密方案,其中大部分不能提供保密性和不可伪造性.即使有些签密方案是安全的,它们也都需要双线性对运算.为了解决上述问题,提出了一个无需对运算的无证书签密方案,并在随机预言模型下,基于计算Diffie-Hellman假设和离散对数困难问题证明了其保密性和认证性.该方案无需双线性对操作.到目前为止,它是己知最有效的无证书签密方案. Only six certificateless signcryption schemes have been proposed in recent years. Most of them cannot provide confidentiality and authentication. Even if some of them are secure, all of them need pairing operations. In order to solve the above-mentioned problems, a pairing-free certificateless signcryption scheme is proposed, and its security has proven to be in the random oracle model (ROM) under the computational Diffie-Hellman (CDH) assumption and the hardness of discrete logarithm problem (DLP). This scheme eliminates pairing operations and is the most efficient certificateless signcryption scheme.
出处 《软件学报》 EI CSCD 北大核心 2011年第8期1918-1926,共9页 Journal of Software
基金 国家高技术研究发展计划(863)(2009AA01Z415)
关键词 签密 无证书 随机预言模型 计算Diffie-Hellman假设 signcryption certificateless ROM (random oracle model) CDH (computational Diffie-Hellman) assumption
  • 相关文献

参考文献12

  • 1Al-Riyami SS, Paterson KG. Certificateless public key cryptography. In: Laih CS, ed. Proc. of the Advances in Cryptology-- Asiacrypt 2003. LNCS 2894, Heidelberg: Springer-Verlag, 2003.452-473. [doi: 10.1007/978,3-540-40061-5_29].
  • 2Huang Q, Wong DS. Generic certificateless encryption in the standard model. In: Miyaji A, Kikucbi H, Rannenberg K, eds. Proc. of the IWSEC 2007. LNCS 4752, Heidelberg: Springer-Verlag, 2007. 278-291. [doi: 10.1007/978-3-540-75651-4_19].
  • 3Aranha D, Castro R, Lopez J, Dahab R. Efficient certificateless signcryption. 2008. http://sbseg2008.inf.ufrgs.br/proceedings/data/ pdf/st03 01 resumo.pdf.
  • 4Chert L, Cheng Z, Smart NP. Identity-Based key agreement protocols from pairings. Int'l Journal of Information Security, 2007, 6(4):213-241. [doi: 10.1007/s10207-006-0011-9].
  • 5Sharmila DS, Vivek SS, Pandu RC. On the security of certificateless signcryption schemes. Cryptology ePrint Archive: Report 2009/298.2009. http://eprint.iacr.org/2009/298.
  • 6Wu CH, Chen ZX. A new efficient certificateless signcryption scheme. In: Proc. of the ISISE 2008. 2008.661-664. [doi: 10.1109/ ISISE.2008.206].
  • 7MIRACL. Multiprecision integer and rational arithmetic C/C++ Library. 2004. http://indigo.ie/mscott/.
  • 8Barbosa M, Farshim P. Certificateless signcryption. In: Proc. of the ACM Symp. on Information, Computer and Communications Security (ASIACCS 2008). ACM, 2008. 369-372. Idol: 10.1145/1368310.1368364].
  • 9Li FG, Shirase M, Takagi T. Certificateless hybrid signcryption. In: Proc. of the ISPEC 2009. LNCS 5451, Berlin, Heidelberg: Springer-Verlag, 2009. 112-123. [doi: 10.1007/978-3-642-00843-6_11].
  • 10Zheng YL. Digital signcryption or how to achieve cost(signature & encryption)<<cost(signature)+cost(encryption). In: Jr Kaliski BS, ed. Proc. of the CRYPTO'97. LNCS 1294, Heidelberg: Springer-Verlag, 1997. 165-179. [doi: 10.1007/BFb0052234].

二级参考文献15

  • 1Shamir A. Identity based cryptosystems and signature schemes//Proeeedings of the Crypto'84. California, USA, 1984:47-53
  • 2Al-Riyami S, Paterson K. Certificateless public key cryptography//Proceedings of the Asiacrypt 2003. Taipei, China, 2003:452-473
  • 3Huang X, Susilo W, Mu Y, Zhang F. On the security of a certifieateless signature scheme//Proceedings of the CANS 2005. Xiamen, China, 2005:13-25
  • 4Yap W, Heng S, Goi B. An efficient certificateless signature scheme//Proceedings of the EUC Workshops 2006. Seoul, Korea, 2006:322-331
  • 5Park J. An attack on the certificateless signature scheme from EUC Workshops 2006. Cryptology ePrint Archive, Report 2006/442, 2006
  • 6Zhang Z, Feng D. Key replacement attack on a certificateless signature scheme. Cryptology ePrint Archive, Report 2006/ 453, 2006
  • 7Choi K, Park J, Hwang J, Lee D. Efficient certificateless signature schemes//Proceedings of the ACNS 2007. Zhuhai, China, 2007:443-458
  • 8Castro R, Dahab R. Two notes on the security of certificateless signatures//Proceedings of the ProvSec 2007. Wollongong, Australia, 2007:85-102
  • 9Zhang J, Mao J. Security analysis of two signature schemes and their improved sehemes//Proceedings of the ICCSA 2007. Kuala Lumpur, Malaysia, 2007:589-602
  • 10Zhang Z, Wong D, Xu J, Feng D. Certificateless public-key signature: security model and efficient construction//Proceedings of the ACNS 2006. Singapore, 20061 293-308

共引文献43

同被引文献380

引证文献59

二级引证文献103

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部