期刊文献+

无证书的可验证签密方案 被引量:1

The Certificateless Verifiable Signcryption Scheme
下载PDF
导出
摘要 签密是把加密和签名结合起来,能实现数据的机密性和认证性.无证书密码体制实现无公钥证书且没有密钥托管的性质.本文提出的方案是一种基于无证书的公钥可验证签密方案,该方案在Al-Riyami提出的安全证明模型中具有机密性和不可伪造性. Signcryption combines the signature and the encryption into one, and implements data confidentiality and authentication. Certificateless cryptosystem realizes the properties of the certificateless and the key-unescrow. So certificateless verifiable signcryption was proposed. The confidentiality and unforgeability of this scheme was proved under the secure model mentioned by Al-Riyam.
出处 《华南农业大学学报》 CAS CSCD 北大核心 2011年第4期110-112,共3页 Journal of South China Agricultural University
基金 国家自然科学基金(60973134) 广东省自然科学基金(9151064201000058 10351806001000000)
关键词 无证书签密 不可伪造 机密性 可验证 certificateIess signcryption unforgeability confidentiality verifiable
  • 相关文献

参考文献10

  • 1ZHENG Yu-liang. Digital signcryption or how to achieve cost( signature & encryption) ≤ cost (signature) + cost (encryption) [J], LNCS, 1997(1294) :165-179.
  • 2FENG Bao, ROBERT H D. A signcryption scheme with signature directly verifiable by public key [ J ]. LNCS, 1998( 1431 ) :55-59.
  • 3LEE M K, KIM D K, PARK K. An authenticated encryp- tion scheme with public verifiability [ M ] //Anon. 5th Japan Korea Joint Workshop on Algorithms and Computa- tion. Tokyo : IEEE,2000 : 49-56.
  • 4HORSTER P, MICHELS M, PETERSEN H. Authentica- ted encryption schemes with low communication costs[J]. Electronics Letters, 1994,30( 15 ) : 1212-1213.
  • 5张串绒,肖国镇.一个可公开验证签密方案的密码分析和改进[J].电子学报,2006,34(1):177-179. 被引量:16
  • 6MALONE-LEE J. Identity based signcryption[ EB/OL], [ 2010-08-20 ]. http ://eprint. iacr. org/2002/098, pdf.
  • 7RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems [J]. Communications of the ACM, 1978, 21 (2) : 120- 126.
  • 8SHAMIR A. Identity based cryptosystems and signature schemes[ J]. LNCS, 1985 (196) :47-53.
  • 9AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[J]. LNCS,2003 (2894):452-473.
  • 10LEE Y R, LEE H S. An authenticated certificateless pub- lic key encryption scheme [ J ]. Information Center for Mathematical Sciences ,2005,8 ( 1 ) : 177-187.

二级参考文献8

  • 1Y L Zheng.Signcryption and its applications in efficient public key solutions[A].LNCS 1397,in Information Security Workshop (ISW′97)[C].Berlin:Springer-Verlag,1998.291-312.
  • 2H Petersen,M Michels.Cryptanalysis and improvement of signcryption schemes[J].IEEProceedings-Computers and Digital Techniques.1998,145(2):149-151.
  • 3W H He,T C Wu.Cryptanalysis and improvement of Petersen-michels signcryption scheme[J].IEE Proceedings-Computers and Digital Techniques.1999,146(2):123-124.
  • 4F Bao,R H Deng.A signcryption scheme with signature directly veriable by public key[A].LNCS 1431,in PKC′98[C].Berlin:Springer-Verlag,1998.55-59.
  • 5P Horster,M Michels,H Petersen.Authenticated encryption schemes with low communication costs[J].Electronics Letters.1994,30(15):1212-1213.
  • 6Mun Kyu Lee,Dong Kyue Kim,Kunsoo Park.An authenticated encryption scheme with public verifiability[A].5th Japan-Korea Joint Workshop on Algorithms and Computation[C].Tokyo,Japan,2000.49-56.
  • 7D Yum,P Lee.New signcryption schemes based on KCDSA[A].LNCS 2288,in the 4th International Conference on Information Security and Cryptology[C].Berlin:Springer-Verlag,2001.341-354.
  • 8Jun Shin,Kwangsu Lee,Kyungah Shim.New DSA-verifiable signcryption schemes[A].LNCS 2587,Jun-BICISC 2002[C].Berlin:Heidelberg,Springer-Verlag,2003.35-47.

共引文献15

同被引文献8

  • 1Shamir A. Identity-based etyptosystems and slgnature schemes [ C ]//Advances in C ptolo -Crypto'84, LNCS 196, Berlin t Sprlnger-Verlag, 1984:47-53.
  • 2Al-riyami S S, Paterson K G. Cert eateless public key cryptography[ C ]//ASIACRYPT03, LNCS 2894. Berlin,. Springer-Verlag, 2003:452- 473.
  • 3Zheng Y L. Digital slgncryptlon or how to achieve cost ( signature & encryption ) < < cost (signature) + cost (encryption) [ C ]//Advances in Cryptology-CRYPTO97, LNCS 1294. Berlin: Springer-Verlag, 1997:165-179.
  • 4Barbesa M, Farshim P. Certifieateless signcryption[ C] // Proceedings of the 2008 ACM Symposium on Information, Computer and Communica- tions Security. New York: ACM, 2008:369-372.
  • 5Selvi S S D, Vivek S S, Rangan C P. Cryptanalysis of certificateless sigacryption schemes and an efficient construction without pairing[ C ]//Pro- ceedings of the Inscrypt 2009, LNCS 6151. Berlin: Spfinger-Verlag, 2010:75-92.
  • 6Liu Z H, Hu Y P, Zhang X S, et al. Certificateless sigacryption scheme in the standard model [ J ]. Information Science, 2010,180 (3) :452- 464.
  • 7Selvi S S D, Vivek S S, Rangan C P. Security weaknesses in two cettificateless signcryption schemes [EB/OL]. (2010-O2-20) [2012-11-15]. http ://eprint. iacr. org/2010/092.
  • 8刘文浩,许春香.无双线性配对的无证书签密方案[J].软件学报,2011,22(8):1918-1926. 被引量:59

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部