期刊文献+

可公开验证的高效无证书签密方案 被引量:5

Efficient Certificateless Signcryption Scheme with Public Verifiability
下载PDF
导出
摘要 根据安全无证书签密模型,提出一种基于双线性对的可公开验证的高效无证书签密方案。该方案由密钥生成中心(KGC)、签密方、解签密方和验证方组成,使用盲化技术以及用户公钥和秘密值先于KGC部分私钥生成的方法提高密码系统的信任等级,在公开验证时只需将明文和密文提交给验证方。分析结果表明,该方案具有安全保密性、不可伪造性、不可否认性,并且计算量较小、易于实现。 According to the safety certificateless signcryption model,this paper presents an efficient certificateless signcryption scheme with public verifiability based on bilinear pairing.There are four participants which are Key Generation Center(KGC),signcryptioner,designcryptioner and verifier.In order to improve the trust level of this cryptosystem,binding technique is adopted and the user's secret value and public key is generated before KGC extracting the partial private key.The public verification only needs the message and ciphertext to validation party.Analysis result shows that the scheme enjoys desirable properties of confidentiality and existential unforgeability,computational cost is lower,and it is easy to realize.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第17期108-110,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60573036) 陕西省自然科学基金资助项目(2010JM8034) 武警工程学院基础研究基金资助项目(wjy201119)
关键词 无证书签密 双线性对 可公开验证 保密性 不可伪造性 certificateless signcryption bilinear pairings public verifiability confidentiality unforgeability
  • 相关文献

参考文献8

  • 1Riyami A l, Paterson K. Certificateless Public Key Cryptography[C]//Proc. of ASIACRYPT’03. Berlin, Germany: Springer- Verlag, 2003: 452-473.
  • 2Zheng Yuliang. Digital Signcryption or How to Achieve Cost (Signature&Encryption)<<Cost(Signature)+Cost(Encryption) [C]// Proc. of the 17th Annual International Cryptology Conference. Santa Barbara, California, USA: Springer-Verlag, 1997: 165-179.
  • 3Han Yiliang. Generalization of Signcryption for Resources- constrained Environments[J]. Wireless Communication and Mobile Computing, 2007, 7(7): 919-931.
  • 4Chen Liquan. Identity-based Signcryption[EB/OL]. (2002-09-08). http://eprint.iacr.org/2002/098.
  • 5Barbosa M, Farshim P. Certificateless Signcryption[C]//Proc. of Computer and Communications Security Conference. Berlin, Germany: Springer-Verlag, 2008.
  • 6Yap W S, Heng S H, Goi B M. An Efficient Certificateless Signature Scheme[C]//Proc. of EUC’06. Berlin, Germany: Springer-Verlag, 2006: 322-331.
  • 7王化群,徐名海,郭显久.几种无证书数字签名方案的安全性分析及改进[J].通信学报,2008,29(5):88-92. 被引量:17
  • 8Chow S S M, Yiu Siu-Ming. Efficient Forward and Provably Secure ID-based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity[C]//Proc. of the 6th Annual International Conference on Information Security and Cryptology. Berlin, Germany: Springer-Verlag, 2003: 352-369.

二级参考文献12

  • 1BESSIE C H, ZHANG Z F, DENG X T. Certificateless signature: a new security model and an improved generic construction[J]. Designs, Codes and Cryptography, 2007, 42(2): 109-12.6.
  • 2SATTAM S A, KENNETH G P. Certificateless public key cryptography[A]. Proc Asiacrypt'03[C]. Springer-Verlag, 2003.452-473.
  • 3ZHANG Z F, FENG D G. On the security of a certificateless public-key encryption [EB/OL]. http://eprint.iacr.org/2005/426.
  • 4CHOW S S M, YAP W S. Certificateless ring signatures [EB/OL]. http://eprint.iacr.org/2007/236.
  • 5ZHANG L, ZHANG F T, WU W. A provably secure ring signature scheme in certificateless Cryptography[A]. provsec'07[C]. Springer- verlag, 2007. 103-121.
  • 6GORANTLA M C, SAXENA A. An efficient certificateless signature scheme[A]. CIS'05[C]. Springer-Verlag, 2005. 110-116.
  • 7CAO X F, KENNETH G. P, KOU W D. An attack on a certificateless signature scheme, cryptology ePrint archive[EB/OL], http://eprint. iacr.org/2006/367.
  • 8YAP W S, HENG S H, GOI B M. An efficient certificateless signature scheme[A]. EUC 2006[C]. Springer-Verlag, 2006. 322-331.
  • 9PARK J H. An attack on the certificateless signature scheme from EUC workshops 2006 [EB/OL]. http://eprint.iacr.org/2006/442.
  • 10LIU J K, AU M H, SUSILO W. Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model[A]. ASIACCS'07[C]. ACM New York, 2007. 273-283.

共引文献16

同被引文献44

  • 1ZHENG Yu-liang. Digital signcryption or how to achieve cost ( signature & encryption) << cost ( signature) + cost ( encryption) [ C]// Proc of Crypto. Berlin; Springer-Verlag, 1997 : 165-179.
  • 2BAEK J,STEINFELD R, ZHENG Yu-liang. Formal proofs for the security of signcryption [ C ]//Proc of PKC. Berlin: Springer-Verlag, 2002:80-98.
  • 3BOYEN X. Multipurpose identity-based signcryption: a Swiss army knife for identity-based cryptography [ C ] //Proc of Crypto. Berlin : Springer-Verlag, 2003 : 383-399.
  • 4LIBERT B, QUISQUATER J J. Efficient signcryption with key privacy from gap Diffie-Hellman groups [ C ]//Proc of PKC. Berlin ; Springer-Verlag, 2004 ;187-200.
  • 5TAN C H. On the security of signcryption scheme with key privacy [J]. IEICE Trans on Fundamentals, 2005, E88-A (4 ) : 1093-1095.
  • 6TAN C H. Analysis of improved signcryption scheme with key privacy[J]. Information Processing Letters,2006,99(4) :135-13B.
  • 7LI C K, YANG Guo-min, WONG D S, e( al. An efficient signcryption scheme with key privacy [ C]//Proc of EuroPKI. Berlin : Springer-Verlag,2007 :78-93.
  • 8YU Gang, YANG Hong-zhi, FAN Shu-qin, et al. Efficient certifi-cateless signcryption scheme from Weil pairing [ J ]. Journal Of Networks,2011,6(9) :1280-1287.
  • 9Al-Riyami S,Paterson K. Certificateless public key cryptography[ C ] // Proceedings of the Asiacrypt 2003,Lecture Notes in Computer Science2894. Taipei : Springer-Verlag, 2003 : 452473.
  • 10Choi K, Park J, Hwang J, et al. Efficient certificateless signature schemes [ C ]// Proceedings of the ACNS 2007,Lecture Notes in ComputerScience 4521. Zhuhai : Springer-Verlag, 2007 : 443 -458.

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部