期刊文献+

一个新的两重门限代理签密方案

New double-threshold proxy signcryption scheme from bilinear pairings
下载PDF
导出
摘要 在签密理论中引入两重门限技术,构造一个新的基于双线性对的两重门限代理签密方案。在该方案中,把第一重(k,n)门限体制应用在密钥共享上,原始签密人把密钥委托给n个秘书来托管,至少k个秘书合作才能恢复此密钥,大大降低了密钥泄露的风险;将第二重(t,m)门限体制应用在代理签密过程中,把签密权委托给m个代签人共享,任何少于t个代理签密者勾结也不能得出正确的签密密文,在很大程度上增强了代理签密的安全性。理论分析表明,说明该方案是可证明安全的,适合实际应用。 By applying the concepts of double threshold technology to signcryption theory, a new double-threshold proxy signcryption scheme from bilinear pairings is proposed.In this new scheme, the first (k, n)threshold technology is adopted in the key sharing,the original signcrypter entrusts this key to n secretaries for escrow,at least k secretaries cooperate can recover the key.It greatly reduces the risk of key-compromise.The (t, m) threshold technology is adopted in the process of proxy signcryption,it gives the right of signcryption to entrust m proxy signcrypters sharing, no less than t proxy signcrypters with no right can receive the correct cipher text.To a great extent, it enhances the security.Analysis shows that the scheme is secure, and it is suitable for many applications in practice.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第32期98-100,127,共4页 Computer Engineering and Applications
关键词 签密 秘密共享 双线性对 代理签密 门限方案 signcryption secret sharing bilinear parings proxy signcryption threshold scheme
  • 相关文献

参考文献10

二级参考文献57

  • 1何业锋,张建中.基于Diffie-Hellman密码体制可验证的动态秘密分享方案[J].陕西师范大学学报(自然科学版),2005,33(1):26-28. 被引量:6
  • 2王萌,刘志镜.基于用户身份加密体系中的门限代理签密方案[J].计算机工程与应用,2006,42(7):126-128. 被引量:5
  • 3刘俊宝,肖国镇.带门限共享解密的多代理签密方案[J].计算机工程,2006,32(23):21-23. 被引量:4
  • 4张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 5Mambo M,Usuda K,Okamoto E.Proxy signature:Delegation of the power to sign message[J].IEICE Trans on Fundam,1996,E79-A(9):1338-1353.
  • 6Lee B,Kim H,Kim K.Strong proxy signature and its applications[C]/Proc of SCIS'01,Oisc,Japan,2001:603-608.
  • 7Shnmir A.Idenfity-based cryptosystems and signature schemes[C]//LNCS 196:Proc of CRYPTO'84.Berlin,Germany:Springer-Verlag,1984:47-53.
  • 8Zheng Y.Digital signcryption or how to achieve cost(signature & eneryption) 《《cost (signature) +cost (encryption)[C]//LNCS 1294:Proc of Advances in Cryptology Crypt'97.Berlin:Springer-Verlag,1997:165-179.
  • 9Gamage C,Leiwo J,Zheng Y.An efficient scheme for secure message transmission using proxy signcryption[C]//Proc of 22nd Australasian Computer Science Conference.Berlin:Springer-Verlag,1999:420-431.
  • 10Liu Jun-bao,Xiao Guo-zhen.Multi-proxy multi-signcryption scheme from pairings[EB/OL].http://arxiv.org/ftp/cs/papers/0509/05Og030.pdf.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部