期刊文献+

新的基于身份的代理重签密 被引量:3

New identity-based proxy re-signcryption
下载PDF
导出
摘要 基于Chandrasekar等人提出的代理重加密签密方案(CHANDRASEKAR S,AMBIKA K,RANGAN P C.Signcryption with proxy re-encryption.http://eprint.iacr.org/2008/276),提出了一个新的基于身份代理重签密方案。该方案利用一个半可信代理人将一个基于身份的签密透明地转换为了另一个基于身份的签密,实现了签密的完全可转换:即同时实现了签密中保密功能和验证功能的转换,且签密的验证不需要明文信息的直接参与。在随机预言机模型下,基于计算性Bilinear Diffie-Hellman问题,证明了方案是IND-CCA2安全的。经效率和功能分析,结果表明该方案解决了Chandrasekar方案中验证功能未能转换的问题和签密的验证需要明文参与的问题。 A new identity-based proxy re-signcryption scheme was put forward on the basis of the signcryption with proxy re-encryption proposed by Chandrasekar S(CHANDRASEKAR S,AMBIKA K,RANGAN P C.Signcryption with proxy re-encryption.http://eprint.iacr.org/2008/276).The new scheme achieves a transparent conversion from one identity-based signcryption to another identity-based signcryption by using a semi-trusted proxy.And it realizes the complete conversion of signcryption,that is,it concurrently achieves the conversion of both confidentiality and verification.In the same time,it realizes the full public verifiability of the signcryption without the direct participation of the plaintext.Based on the Computation Bilinear Diffie-Hellman(CBDH) problem,it is proved to be IND-CCA2 secure in the Random Oracle Model(ROM).Through the analysis of its efficiency and function,the scheme resolves the problems of both failing to realize the conversion of the verification and the verifiability of signcryption needing the participation of plaintext in the scheme advanced by Chandrasekar S.
出处 《计算机应用》 CSCD 北大核心 2011年第11期2986-2989,共4页 journal of Computer Applications
基金 教育部科学技术研究重点项目(208148) 教育部新教师基金资助项目(200802131023) 国家自然科学基金资助项目(60803147) 安徽省教育厅自然科学项目(KJ2010B059) 安徽科技学院安徽省自然科学基金预研项目(ZRC2011274)
关键词 基于身份密码体制 签密 代理重签密 随机预言机模型 双线性映射 identity-based cryptosystem signcryption proxy re-signcryption Random Oracle Model(ROM) bilinear map
  • 相关文献

参考文献7

  • 1KIRTANE V, RANGAN C P. RSA-TBOS signcryption with proxy re-encryption [ EB/OL]. [2010 - 11 - 10]. http://eprint, iacr. org/2008/324.
  • 2CHANDRASEKAR S, AMBIKA K, RANGAN P C. Signcryption with proxy re-encryption [ EB/OL]. [ 2010 - 11 - 10]. http:// eprint, iacr. org/2008/276.
  • 3邓宇乔,杜明辉,尤再来,王晓华.一种基于标准模型的盲代理重签名方案[J].电子与信息学报,2010,32(5):1219-1223. 被引量:18
  • 4ATENIESE G, HOHENBERGER S. Proxy re-signatures: New defi- nitions, algorithms, and applications[ C]//CCS'05: Proceedings of the 12th ACM Conference on Computer and Communications Securi- ty. New York: Springer-Verlag, 2005:310 -319.
  • 5BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[ EB/OL]. [ 2011 - 01 -01 ]. http://www, iacr. org/archive/ crypto2001/21390212, pdf.
  • 6GALBRAITH S D. Supersingular curves in cryptography [C]// ASIACRYPT'01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. London: Springer-Verlag, 2001: 495- 513.
  • 7POINTCHEVAL D, STERN J. Security proofs for signature schemes [ C] // EUROCRYIrF' 96: Proceedings of the 15th Annual Interna- tional Conference on Theory and Application of Cryptographic Tech- niques. Berlin: Springer-Verlag, 1996:387 -398.

二级参考文献14

  • 1Blaze M,Bleumer G,and Strauss M.Divertible protocols and atomic proxy cryptography.Proceedings of Advances in Cryptology:EUROCRYPT'98.Helsinki,Finland,1998,1403:127-144.
  • 2Ateniese G and Hohenberger S.Proxy re-signatures:New definitions,algorithms and applications.Proceedings of the 12th ACM conference on Computer and communications security,Alexandria,USA,2005:310-319.
  • 3Sherman C and Raphael P.Proxy re-signatures in the standard model.11th International Conference on Information Security,Taibei,China,2008:260-276.
  • 4Jun S,Zhenfu C,Licheng W,and Xiaohui L.Proxy re-Signature schemes without random oracles.Progress in Cryptology-INDOCRYPT 2007,Chennai,India,2007,4859:197-209.
  • 5Kitae K,Ikkwon Y,and Seongan L.Remark on shao et al's bidirectional proxy re-signature scheme in indocrypt'07.International Journal of Network Security,2009,9(1):8-11.
  • 6Benoit L and Damien V.Multi-use unidirectional proxy re-signatures.http://eprint.iacr.org/2007/371.pdf,2008,2.
  • 7Chaum D.Blind signature for untraceable payments,Advances in Cryptology-Crypto'82,Burg Feuerstein,Germany,1982:199-203.
  • 8Abe M and Fujisaki E.How to date blind signatures.Advances in Cryptology Asiacrypto' 96,Kyongju,Korea,1996,163:244-251.
  • 9Abe M and Okamoto T.Provably secure partially blind signautres.Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology,California,USA,2000:271-286.
  • 10Maitland G and Boyd C.A provably secure restrictive partially blind signature scheme.Public Key Cryptography PKC 2002,Paris,France,2002:99-114.

共引文献17

同被引文献20

  • 1张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 2Zuo Wei-ping. An ID-Based Proxy Multi-signcryption Scheme from Pairings[C]// Proceedings of 2010 International Conferen- ce on Multimedia Information Networking and Security. Wa- shington, DC, USA: IEEE Computer Society, 2010: 403-405.
  • 3Li Fa-gen, Yu Yong. An Efficient and Provably Secure ID-Based Threshold Signcryption Seheme[C]//Proceedings of 2008 Inter- national Conference on Communications, Circuits and Systems. Berlin: Springer-Verlag, 2008 : 488-492.
  • 4Kirtane V, Rangan C P. RSA-TBOS Signcryption with Proxy Re-encryption[C]//Proceedings of the 8th ACM Workshop on Digital Rights Management. NewYork, NY, USA: ACM, 2008: 59-66.
  • 5Chandrasekar S, A.mbika K, Rangan P C. Signcryption with Proxy Re-encryption [EB/OL]. http://eprint, iacr. org/2008/ 276,2011-10-05.
  • 6Wang Cai-fen, Cao Xiao-jun. An Improved Signcryption with Proxy Re-encryption and Its Application [C]//Proceedings of 7th International Conference on Computational Intelligence and Security. Washington,DC,USA: IEEE Computer Society, 2011 : 886-890.
  • 7Wang Hui-ge,Wang Cai-fen,Cao Hao. ID-Based Proxy Re-sign- cryption Scheme[C]//Proceedings of 2011 IEEE International Conference on Computer Science and Automation Engineering. Washington, DC, USA: IEEE Computer Society, 2011 : 317-321.
  • 8Duan Shan-shan, Cao Zhen-fu. Efficient and provably secure multi-receiver identity-based signcryption[C]//Proceedings of the 11th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2006 : 195-206.
  • 9Pointcheval D, Stem J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13 (3): 361-396.
  • 10Barsoum A F, Hasan M A. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems[EB/OL]. http://cacr, uwaterloo, ca/techreports/2012/cacr2012- 05. pdf, 2012-03-10.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部