期刊文献+

一个在线/离线签密方案的分析和改进 被引量:1

Cryptanalysis and improvement of an online/offline signcryption scheme
下载PDF
导出
摘要 对Liu等人提出的基于身份的在线/离线签密方案(LIU J K,BAEK J,ZHOU J.Online/offline identity-based signcryption re-visited.Inscrypt'10:Proceedings of the 6th International Conference on Information Security andCryptology.Berlin:Springer-Verlag,2010:90-102)进行了密码分析和改进。研究了Liu方案的不可伪造性,证明了Liu方案不能抵抗自适应选择消息和身份攻击,是可伪造的,并提出了对Liu方案的一个修改方案。修改方案克服了Liu方案中存在的安全漏洞,是一个安全的基于身份的在线/离线签密方案。 Liu's online/offline signcryption scheme(LIU J K,BAEK J,ZHOU J.Online/offline identity-based signcryption re-visited.Inscrypt'10: Proceedings of the 6th International Conference on Information Security and Cryptology.Berlin: Springer-Verlag,2010:90-102) was cryptanalyzed and improved in this paper.By studying the unforgeability of Liu's scheme,this paper proved that Liu's scheme would be not unforgeable against adaptive chosen message and identity attack.To overcome the security problem in Liu's scheme,a modified scheme was proposed,and the modified scheme was proved to be a secure Identity-based online/offline signcryption scheme.
出处 《计算机应用》 CSCD 北大核心 2011年第11期2983-2985,共3页 journal of Computer Applications
基金 江苏省自然科学基金资助项目(BK20082140) 淮海工学院引进人才科研启动基金资助项目(KQ10121) 淮海工学院校内课题资助项目(KX10530)
关键词 签密 基于身份 双线性对 可证安全 随机预言模型 signcryption identity based bilinear pairing provably secure Random Oracle Model(ROM)
  • 相关文献

参考文献11

  • 1ZHENG Y. Digital signcryption or how to achieve Cost ( Signature & Encryption) < < Cost (Signature) + Cost (Encryption) [ C]// CRYPTO'97: 17th Annum International Cryptology Conference, LNCS 1294. Berlin: Springer-Verlag, 1997:165-179.
  • 2GAMAGE C, LEIWO J, ZHENG Y. Encrypted message authentica- tion by firewalls [ C]/! PKC'99: Proceedings of the Second Interna- tional Workshop on Practice and Theory in Public Key Cryptogra- phy, LNCS 1560. Berlin: Springer-Verlag, 1999: 69-81.
  • 3PANG X, TAN K L, WANG Y, et al. A secure Agent-mediated payment protocol [ C]/! ICICS 2002: Proceedings of the 4th Inter- national Conference on Information and Communications Security, LNCS2513. Berlin: Springer-Verlag, 2002: 422-433.
  • 4陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 55HAMIR A. Identity-based cryptosystems and signature schemes [ EB/OL]. [ 2011 -02 -01 ]. http://www, iseca, org/downloads/ Shamir47. pdf.
  • 6LEE M J. Identity-based signcryption [ EB/OL]. [ 2011 - 04 - 08]. http://eprint, iacr. org/report 2002/98.
  • 7EVEN S, GOLDREICH O, MACALI S. On-line/off-line digital sig- natures [ C]// CRYPTO'89: Proceedings on Advances in Cryptolo- gy. New York: Springer-Verlag, 1989:263-275.
  • 8AN J H, DODIS Y, RABIN T. On the security of joint signature and eneryption [ C]// Eurocrypt 2002: Advances in Cryptology, LNCS 2332. Berlin: Springer, 2002:83 - 107.
  • 9ZHANG F, MU Y, SUSILO W. Reducing security overhead for mo- bile networks [ C]//AINA'05: Proceedings of the 19th International Conference on Advanced Information Networking and Applications. Washington, DC: IEEE Computer Society, 2007:398 -403.
  • 10SUN D, MU Y, SUSILO W. A generic construction of identity- based online/offline signcryption [ C ]// ISPA'08: Proceedings of the 2008 IEEE Intemational Symposium on Parallel and Distributed Processing with Applications. Washington, DC: IEEE Computer So- ciety, 2008:707 -712.

二级参考文献16

  • 1Desmedt Y.. Some recent research aspects of threshold cryptography. In: Okamoto E., Davida G., Mambo M. eds.. Information Security. Lecture Notes in Computer Science 1396. Berlin: Springer-Verlag. 1997, 158~173.
  • 2Canetti R., Gennaro R., Jarecki S., Krawczyk H., Rabin T.. Adaptive security for threshold cryptosystems. In: Wiener M.ed..Proceedings of Advances in Cryptology-CRYPTO'99. Berlin: Springer-Verlag, 1999, 98~115.
  • 3Needham R., Schroeder M.. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978, 21(12): 993~999.
  • 4Bellare M., Rogaway P.. Provably secure session key distribution--The three party case. In: Proceedings of the 27th Annual ACM Symposium on the Theory of Computing, Las Vegas, Nevada, USA, 1995, 57~66.
  • 5Naor M., Pinkas B., Reingold O.. Distributed pseudo-random functions and KDCs. In: Jacques ed.. Advances in Cryptology-Eurocrypt'99. Lecture Notes in Computer Science 1592. Berlin: Springer-Verlag, 1999, 327~346.
  • 6Daza V., Herranz J., Padro C., Saez G.. A distributed and computationally secure key distribution scheme. In: Chan A.H., Gliger V.eds.. Information Security. Lecture Notes in Computer Science 2433. Berlin: Springer, 2002, 342~356.
  • 7Zheng Y.. Digital signcryption or how to achieve cost(signature& encryption).
  • 8Zheng Y., Imai H.. Using signcryption to build compact and unforgeable key establishment over an ATM network. In: Proceedings of IEEE INFOCOM'98, San Francisco, CA, USA, 1998, 411~418.
  • 9Shamir A.. How to share a secret. Communications of the ACM, 1979, 22(11): 612~613.
  • 10Bellare M., Rogaway P.. Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, USA, 1993, 62~73.

共引文献18

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部