期刊文献+

内部安全模型下几个签密方案的密码分析

Cryptanalysis of some signcryption schemes in insider-security model
下载PDF
导出
摘要 针对五个文献中的六个签密方案,分析了它们在内部安全模型下的保密性和不可伪造性。分析表明有五个方案存在保密性攻击,有四个方案存在伪造性攻击,提出了一些针对这些方案的攻击方法,并分析了攻击成功的原因。针对这些方案的安全缺陷,使用签名部分绑定接收者和加密部分绑定发送者的方法,分别给出了能有效克服攻击的改进措施。 This paper analyzed the confidentiality and unforgeability of six signcryption schemes in five papers under insider-security model.The analysis results show that there’s existing confidentiality attacks in five schemes and forgeability attacks in four schemes.Then this paper presented some concrete attack methods for these schemes,and analyzed the reasons for the success of attacks.According to the security flaws of these schemes,using the methods of binding receiver in signature part and binding sender in encryption part,it put forward countermeasures against these attacks respectively
作者 周才学
出处 《计算机应用研究》 CSCD 北大核心 2012年第9期3493-3496,共4页 Application Research of Computers
关键词 签密 无证书签密 多接收者签密 内部安全模型 前向安全性 公开可验证性 signcryption certificateless signcryption multi-receiver signcryption insider-security model forward security public verification
  • 相关文献

参考文献12

  • 1ZHENG Yu-liang. Digital signcryption or how to achieve cost ( signature & encryption) << cost ( signature) + cost ( encryption) [ C]// Proc of Crypto. Berlin; Springer-Verlag, 1997 : 165-179.
  • 2BAEK J,STEINFELD R, ZHENG Yu-liang. Formal proofs for the security of signcryption [ C ]//Proc of PKC. Berlin: Springer-Verlag, 2002:80-98.
  • 3BOYEN X. Multipurpose identity-based signcryption: a Swiss army knife for identity-based cryptography [ C ] //Proc of Crypto. Berlin : Springer-Verlag, 2003 : 383-399.
  • 4LIBERT B, QUISQUATER J J. Efficient signcryption with key privacy from gap Diffie-Hellman groups [ C ]//Proc of PKC. Berlin ; Springer-Verlag, 2004 ;187-200.
  • 5TAN C H. On the security of signcryption scheme with key privacy [J]. IEICE Trans on Fundamentals, 2005, E88-A (4 ) : 1093-1095.
  • 6TAN C H. Analysis of improved signcryption scheme with key privacy[J]. Information Processing Letters,2006,99(4) :135-13B.
  • 7LI C K, YANG Guo-min, WONG D S, e( al. An efficient signcryption scheme with key privacy [ C]//Proc of EuroPKI. Berlin : Springer-Verlag,2007 :78-93.
  • 8张建航,胡予濮,齐新社.具有前向安全性和公开可验证性的签密方案[J].计算机应用研究,2011,28(2):733-734. 被引量:7
  • 9蔡伟艺,杨晓元,韩益亮,张敏情,陈海滨.可公开验证的高效无证书签密方案[J].计算机工程,2011,37(17):108-110. 被引量:5
  • 10任艳丽,陆海宁.基于椭圆曲线的可证明安全的签密方案1[J].计算机工程,2011,37(15):95-97. 被引量:2

二级参考文献34

  • 1隋爱芬,杨义先,钮心忻,罗守山.基于椭圆曲线密码的可认证密钥协商协议的研究[J].北京邮电大学学报,2004,27(3):28-32. 被引量:27
  • 2李光松,韩文报.分簇Ad Hoc网络的密钥管理[J].计算机科学,2006,33(2):79-82. 被引量:6
  • 3张鹏,叶澄清,马雪英,李欣.一种改进的门限代理签密协议[J].浙江大学学报(工学版),2006,40(3):392-394. 被引量:3
  • 4李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 5陈兴荣.椭圆曲线加密系统的设计与实现[D].成都:电子科技大学,2002.
  • 6HWANG J, LAICH, SU F F. An efficient signcryption scheme with forward secrecy based on elliptic curve[J].Applied Mathematics and Computation, 2005,167(2):870-881.
  • 7ZHENG Y L, IMAI H. How to construct efficient signcryption schemes on elliptic curves[J].Information Processing Letters,1998,68(5):227-233.
  • 8ZHENG Y L. Digital signcryption or how to achieve cost (signature & encryption)<.
  • 9ANDERSON R. Two remarks on public-key cryptology[C]//Proc of the 4th ACM Conference on Computer and Communications Security. New York:ACM, 1997:151-160.
  • 10Du H Z,Wen Q Y.An efficient identity-based multi-recipient signcrypytion scheme[J].Journal of Shenzhen university science and engineering,2009,26(2):127-132.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部