期刊文献+

可抵抗恶意私钥中心的无证书公钥加密方案

Certificateless Public Key Encryption Scheme Against Malicious KGC Attack
下载PDF
导出
摘要 目前,大多数基于无证书的加密方案和签名方案的构造方法都忽视了恶意私钥中心的攻击,如何设计一个有效的可抵抗恶意私钥中心的无证书密码系统是研究热点.通过对原始的无证书加密方案顺序的改变,利用双线性映射构造了一个高效的可以抵抗恶意私钥中心的无证书加密方案.在方案中,加密过程只需一次幂运算,解密过程仅需一个对运算.与已有的方案相比具有很高的效率.方案安全性基于计算Diffie-Hellman问题和P-双线性Diffie-Hellman Inversion问题,并在随机预言模型下对用该方法所构造的方案的安全性进行了证明. Recently, most of the certificateless public key encryption scheme and signature scheme neglect the attack from malicious KGC, so how to design an effective certificateless public key encryption to resist the malicious KGC attack is an interesting research topic. In this paper, by adjusting the steps of original certificateless public key encryption, an efficient certificateless public key en- cryption scheme using bilinear maps is put forward, which can against the malicious KGC attack. The encryption algorithm only need one power computation and the decryption only need one paring computation. Therefore, the scheme is more efficient than other exi- ting scheme. Additionally, under the random oracle model, the security reaches chosen-ciphertext secure assuming the computing Dif- fie-Hellman and p-Bilinear Diffie-Hellman Inversion problems are difficult.
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第12期2715-2719,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金重大研究计划项目(90718021)资助 江苏省自然科学基金项目(BK2007593)资助
关键词 无证书密码系统 随机预言模型 恶意私钥中心 双线性映射 certificateless public key cryptography random oracle model malicious KGC bilinear maps
  • 相关文献

参考文献3

二级参考文献37

  • 1吴问娣,曾吉文.一种无证书的环签名方案和一个基于身份的多重签名方案[J].数学研究,2006,39(2):155-163. 被引量:15
  • 2Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the power to sign messages. IEICE Trans. on Fundamentals, 1996, E79-A(9): 1338-1353.
  • 3Zhang k Threshold proxy signature schemes. In: Proc. of the 1997 Information Security Workshop. Japan, 1997. 191-197.
  • 4Yi LJ, Bai GQ, Xiao GZ. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 2000,36(6): 527-528.
  • 5Huang XY, Mu Y, Susilo W, Zhang FT. Short designated verifier proxy signature from pairings. In: Proc. of the SecUbiq 2005. LNCS3823, Nagasaki, Springer-Verlag, 2005. 835-844.
  • 6Zhang FG, Kim-K. Efficient 1D-based-blind signature and proxy signature from bilinear pairings. In: Safavi-Naini R, Seberry J, eds. Proc. of the ACISP 2003. LNCS 2727, Springer-Verlag, 2003. 312-323.
  • 7Al-Riyami S, Paterson K. Certificateless public key cryptography. In: Prec. of the Asiacrypt 2003. LNCS 2894, Springer-Verlag, 2003. 452-473.
  • 8Huang XY, Mu Y, Susilo W, Wong DS, Wu W. Certificateless signature revisited. In: Proc. of the Acisp 2007. LNCS 4586, Springer-Verlag, 2007. 308-322.
  • 9Zhang ZF, Wong DS, Xu J, Feng DG. Certificateless public-key signature: Security model and efficient construction. In: Zhou J, Yung M, Bao F, eds. Proc. of the ACNS 2006. LNCS 3989, Springer-Verlag, 2006. 293-308.
  • 10Li X, Chen K, Sun L. Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal, 2005,45(1 ):76-83.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部