期刊文献+

无证书代理重签密方案 被引量:1

A Certificateless Proxy Re-Signcryption Scheme
原文传递
导出
摘要 结合无证书密码体制和签密思想提出了一个无证书代理重签密方案,在方案中,使用一个半可信代理人实现了一个签密到另一个签密的透明转换.与其他相似方案相比,实现了签密的完全转换.一般情况下,在Alice的私钥和Bob的公钥下完成的签密经转换后只能用Alice的身份信息和Daddy的私钥解签密;在本文提出的方案中,由Alice的私钥和Bob的公钥完成的签密经转换后可以用Charlie的身份信息和Daddy的私钥解签密,且签密的验证不需要明文信息的直接参与.基于间隙双线性Diffie-Hellman问题,在随机预言机模型下,证明了可以抵抗无证书代理重签密中的第一类攻击. A certificateless proxy re-signcryption scheme is advanced by combining certificateless cryptosystem with signcryption. In this scheme, the transparent conversion from one signcryption to another is achieved by utilizing a semi-trusted proxy. Compared with the other similar schemes, this scheme realizes the complete conversion of sign- cryption. Generally, after the signcryption under the private key of Alice and the public key of Bob is converted, it can only be de-signcryted by using the identity information of Alice and the private key of Daddy. However, in the scheme advanced in this paper, not only can the identity information of Charlie and the private key of Daddy de-signcrypt the converted signcryption under the private key of Alice and the public key of Bob, but also the verification of signcrytion does not involve the direct participation of plaintext. Based on the GBDH problem, it can be proved that this scheme can resist the first kind of attacks in certifieateless proxy re-signcryption under the Random Oracle Model.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2012年第4期370-376,共7页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金(61163038) 高等学校省级优秀青年基金(2012SQR141) 安徽省教育厅自然科学研究项目(KJ2010B059)资助项目
关键词 无证书密码体制 签密 重签密 随机预言机模型 间隙双线性Diffie-Hellman certificateless cryptosystem signcryption re-signcryption ROM(random oracle model) GBDH (gapbilinear Diffie-Hellman)
  • 相关文献

参考文献11

  • 1Zheng Yuliang. Digital signcryption or how to achieve coste signature&encryption) cost (signature) + cost (encryption) [DB/OL]. [2010-10-20]. http://citeseerx. ist. psu. edu/viewdoc/summary doi = 10. 1. 1. 14.1758.
  • 2陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 3Al-Riyarni S S, Paterson K G. Certificateless public key cryptography [DB/OL]. [2010-10-10]. http:// www.springerlink.com/content/ 4wc47elk7f p8xwty/.
  • 4Gang Yu , Hongzhi Yang, Shuqin Fan, et al. Efficient Certificateless Signcryption Scheme [DB/ OL]. [2010-12-12]. http://www.google.com.hk/url sa = t&rct = j&q= CertiEf ficient + Certificateless+; Signcryption + Scheme&source = web&cd = 1&ved = OCC8- QFjAA&url = http% 3A% 2F% 2Fwww. academy- publisher. com% 2Fproc% 2Fisecsl0w% 2Fpapers% 2Fisecs10wp55. pdf&ei = yb8 _ T-C _ C-GdiAeFx8- HbBA&usg = AFQjCNGyx0DlCOWV _ YjdYl_ XcygB-J oPhg&cad =rjt.
  • 5WU Chenhuang, Chen Zhixiong. A new efficient certificateless signcryption scheme [DB/OL]. [2010-10- 10]. http://www. computer. org/portal/web/csdl/ doi/10. 1109/ 1S1SE. 2008. 206.
  • 6Barbosa M, Farshim P. Certificateless signcryption [C]/ /Proc of AS1ACCS2008. New York: ACM, 2008: 369-372.
  • 7LiFagen, Masaaki S, Tsuyoshi T. Certificateless hybrid signcryption [DB/OL]. [2010-10-15]. http:// www.springerlink.com/content/ Ij1hlqlk6351p585/.
  • 8朱辉,李晖,王育民.不使用双线性对的无证书签密方案[J].计算机研究与发展,2010,47(9):1587-1594. 被引量:47
  • 9Kirtane Vv Rangan C P. RSA-TBOS signcryption with proxy re-encryption[DB/OL]. [2010-11-12]. http:// eprint. iacr. org/ 2008/324.
  • 10Chandrasekar S,Ambika K,Rangan C P. Signcryption with proxy re-encryption[DB/OL]. [2010-10-12]. http://eprint. iacr. org/ 2008/276.

二级参考文献26

  • 1Zheng Yuliang.Digital signcryption or how to achieve cost (signature and encryption) 《《 cost (signature) + cost (encryption)[G] //LNCS1294,CRYPTO'1997.Berlin:Springer,1997:165-179.
  • 2AI-Riyami S S,Paterson K G.Certificateless public key cryptography[G] //LNCS2894:Asiacrypt'03.Berlin!Springer,2003:452-473.
  • 3Shamir A.Identity-based cryptosystems and signature schemes[G] //LNCS196:CRYPTO'1984.Berlin; Springer,1984:47-53.
  • 4Aranha D,Castro R,Lopez J,et al.Efficient certificateless signcryption[EB/OL].(2008-09-05)[2009-03-21].http.//sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_01_resumo.pdf.
  • 5Wu Chenhuang,Chen Zhixiong.A new efficient certificateless signcryption scheme[C] //Proc of ISISE'08.Piscataway,NJ:IEEE,2008:661-664.
  • 6Barreto P L,Deusajute A M,Cruz E C,et al.Toward efficient certificateless signcryption from (and without)bilinear pairings[EB/OL].(2008-09-05)[2009-03-21].http://sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_03_artigo.pdf.
  • 7Sharmila D S,Vivek S S,Pandu R C.On the security of certificateless signcryption schemes[EB/OL].(2009-03-05)[2009-06-12].Http://eprint.Iacr.Org/2009/298.Pdf.
  • 8Barbosa M,Farshim P.Certificateless signcryption[C] //Proc of ASIACCS'2008.New York:ACM,2008:369-372.
  • 9Li Fagen,Masaaki S,Tsuyoshi T.Certificateless hybrid signcryption[G] //LNCS5451,Proc of ISPEC2009.Berlin,Springer,2009:112-123.
  • 10Desmedt Y.. Some recent research aspects of threshold cryptography. In: Okamoto E., Davida G., Mambo M. eds.. Information Security. Lecture Notes in Computer Science 1396. Berlin: Springer-Verlag. 1997, 158~173.

共引文献64

同被引文献16

  • 1柴震川,董晓蕾,曹珍富.利用二次剩余构造的基于身份的数字签名方案[J].中国科学(F辑:信息科学),2009,39(2):199-204. 被引量:9
  • 2谷利泽,张胜,杨义先.一种新型的代理签名方案[J].电子与信息学报,2005,27(9):1463-1466. 被引量:18
  • 3Zheng Yuliang.Digital Signcryption or How to Achieve Cost(Sign-ature&Encryption Cost)<.
  • 4Steinfeld R,Zheng Yuliang.A Signcryption Scheme Based on Integer Factorization[C]//Proceedings of the 3rd International Workshop on Information Security.Wollongong,Australia:[s.n.],2000:131-146.
  • 5Li Fagen,Tsuyoshi T.Secure Identity-based Signcryption in the Standard Model[J].Mathematical and Computer Modelling,2013,57(11/12):2685-2694.
  • 6Pang Liaojun,Li Huixian,Gao Lu,et al.Completely Anonymous Multi-recipient Signcryption Scheme with Public Verification[J].PLOS One,2013,8(5).
  • 7Gamage G,Leiwo J,Zheng Yuliang.An Efficient Scheme for Secure Message Transmission Using Proxy Signcryption[C]//Proceedings of the 22nd Australasian Computer Science.Berlin,Germany:[s.n.],1999:420-431.
  • 8Qiu Weidong,Chen Kefei.Identity Oriented Signature Scheme Based on Quadratic Residues[J].Mathematics and Computation,2005,168(1):235-242.
  • 9Clifford C.An Identity Based Encryption Scheme Based on Quadratic Residues[C]//Proceedings of the 8th IMA International Conference on Cryptography and Coding.Cirencester,UK:[s.n.],2001:360-363.
  • 10Yu Yong,Mu Yi,Susilo W.Provably Secure Proxy Signature Scheme from Factorization[J].Mathematics and Computation Modelling,2012,55(3/4):1160-1168.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部