期刊文献+

一个动态门限的基于属性签密方案 被引量:4

A Dynamic Threshold Attributes-based Signcryption Scheme
下载PDF
导出
摘要 签密能同时实现加密与签名,并且代价小于传统的先签名再加密。该文在Li等人(2010)签名方案的基础上提出了一个动态门限的基于属性签密方案,除具有一般签密方案的保密性和认证性外,还同时具有签密者属性隐私安全性和多接收者特性。在随机预言机模型下,利用判定双线性Diffie-Hellman(DBDH)问题和计算Diffie-Hellman(CDH)问题的困难性,证明了该方案满足在适应性选择密文攻击下的不可区分性及适应性选择消息下的不可伪造性。 Signcryption combines the functionalities of signature and encryption and costs less than that required by the traditional signature-then-encryption approach. On the basis of Li et al. (2010) attribute-based signature, a new attributes-based signcryption is proposed in this paper, in which not only confidentiality and authentication is provided but also attribute-signcryptor privacy and multi-recipient is achieved. This scheme is provable secure in the random oracle model and it satisfies indistinguishability against adaptive chosen ciphertext attack based on Decisional Bilinear Diffie-Hellman (DBDH) assumption and chosen message attack based on the standard Computational satisfies existential unforgeability against adaptive Diffie-Hellman (CDH) assumption.
出处 《电子与信息学报》 EI CSCD 北大核心 2012年第11期2680-2686,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61073042 61170241) 中央高校基本科研业务费专项资金(HEUCF100606) 网络与数据安全四川省重点实验室开放课题基金(201107)资助课题
关键词 基于属性签密 动态门限 属性隐私 多接收者 随机预言机模型 Attributes-Based SignCryption (ABSC) Dynamic threshold Attribute privacy Multi-recipient Random oracle model
  • 相关文献

参考文献17

  • 1Zheng Y and Imaih H. Efficient and unforgeable multicast conference key establishment without relying on a key distribution center[C]. Proceedings of the 20th Symposium on Information Theory and Its Applications, Matsuyama, Japan Dec. 2-5, 1997: 365-368.
  • 2Shamir A. Identity-based cryptosystems and signatures schemes[C]. Proceedings of the 4th Annual Internutional Cryptology Conference, Santa Barbara, CA, USA, Aug. 19-22, 1984, LNCS 196: 47-53.
  • 3Boneh D and Franklin M K. Identity based encryption from the well pairing[C]. Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, California, USA, Aug. 19-23, 2001: 213-229.
  • 4Malone-Lee J. Identity based signcryption[R]. IACR Cryptology ePrint Archive, Report, 2002, 098, 2002.
  • 5Mu Y, Susilo W, and Lin Y X. Identity-based authenticated broadcast encryption and distributed authenticated encryption[C]. Proceedings of the 9th Asian Computing Science Conference, Thailand, Dec. 8-10, 2004, LNCS 3321: 169-181.
  • 6Yu Y, Yang B, Huang X Y, et al.. Efficient identity-based signcryption scheme for multiple receivers[C]. Proceedings of the 4th International Conference on Autonomic and Trusted Computing, Hong Kong, China, July 11-13, 2007, LNCS 4610: 13-21.
  • 7Sahai A and Waters B. Fuzzy identity-based encryption[C]. Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques:Advances in Cryptology, Aarhus, Denmark, May 22-26, 2005, LNCS 3494: 457-473.
  • 8Goyal V, Pandey O, Sahai A, et al.. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, Oct. 30-Nov. 3, 2006: 221-238.
  • 9Maji H K, Prabhakaren M, and Rosulek M. Attribute-based signatures: achieving attribute-privacy and collusion- resistance[R]. IACR Cryptology ePrint Archive, Report, 2008/328, 2008.
  • 10Maji H K, Prabhakaren M, and Rosulek M. Attribute-based signatures[R]. Cryptology ePrint Archive, Report, 2010, 595, 2010.

同被引文献15

  • 1韩益亮,卢万谊,武光明,杨晓元.适用于网络大数据的属性基广义签密方案[J].计算机研究与发展,2013,50(S2):23-29. 被引量:2
  • 2韩益亮,杨晓元.ECDSA可公开验证广义签密[J].计算机学报,2006,29(11):2003-2012. 被引量:29
  • 3Shamir A.Identity-based Cryptosystems and Signature Schemes,1984.
  • 4Boneh D;Franklin M.Identity-Based Encryption from the Weil Pairing,2001.
  • 5Goyal V,Pandey O,Sahai A,Waters B.Attribute-Based encryption for fine-grained access control of encrypted data[].Procof theth ACM Confon Computer and Communications Security (CCS).2006
  • 6Maji HK,Prabhakaran M,Rosulek M.Attribute-Based signatures[].Procof the Topics in Cryptology-CT-RSA.2011
  • 7GagnéM,Narayan S,Safavi-Naini R.Threshold attributebased signcryption[].Proc of SCN.2010
  • 8Li J,Au MH,Susilo W,Xie D,Ren K.Attribute-Based signature and its applications[].Procof theth ACM Sympon InformationComputer and Communications Security (ASIACCS).2010
  • 9SAHAI A,WATERS B.Fuzzy identity-based encryption[].Advances in Cryogenic Engineering.2005
  • 10Zheng Y.Digital signcryption or how to achieve cost(signature & encryption) (cost (signature)+cost(encryption))[].Advances in Cryptology—CRYPTO’.1997

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部