期刊文献+

一种改进的自认证多接收者签密方案

An Improved Self-certified Multi-receiver Signcryption Scheme
下载PDF
导出
摘要 对王之仓等人提出的自认证多接收者签密方案(微电子学与计算机,2010年第11期)进行分析,指出攻击者可以利用公开的信息伪造合法的新消息,因此不具有不可伪造性,并基于有限域上离散对数问题的难解性,通过在会话加密过程中加入发送者的私有数据,提出一种改进方案。理论分析结果证明,改进方案能抵抗伪造攻击,具有不可否认性和保密性。 This paper analyzes the self-certified multi-receiver signcryption scheme proposed by Wang Zhicang et al,and points out that attackers can forge new legal messages by public information,so that their scheme does not have the characteristic of unforgeability.Based on the discrete logarithm problem in finite field,this paper proposes an improved scheme by inserting the sender’s private data into the encrypted session.Analysis result proves that the improved scheme can resist forgery attack,and has the characteristics of non-repudiation and confidentiality.
作者 吴凡 徐丽丽
出处 《计算机工程》 CAS CSCD 2012年第23期143-145,共3页 Computer Engineering
关键词 自认证 多接收者签密 有限域 离散对数问题 冒充攻击 不可否认性 保密性 self-certified multi-receiver signcryption finite field discrete logarithm problem forgery attack non-repudiation confidentiality
  • 相关文献

参考文献9

  • 1Zheng Yuliang.Signcryption and Its Application in Efficient PublicKey Solutions[C]//Proceedings of Workshop on InformationSecurity.Santa Barbara,USA:Springer-Verlag,1997:291-312.
  • 2Baek J,Steinfeld R,Zheng Yuliang.Formal Proofs for the Securityof Signcryption[C]//Proceedings of Conference on Public KeyCryptography.Paris,France:Springer-Verlag,2002:363-366.
  • 3Elkamchouchi H M,Nasr M E,Ismail R.ANew Efficient PubliclyVerifiable Signcryption Scheme and Its Multiple Recipients Variantfor Firewalls Implementation[C]//Proceedings of the 26th NationalRadio Science Conference.Cario,Egypt:IEEE Press,2009:1-9.
  • 4Girault M.Self-certified Public Keys[C]//Proceedings ofEUROCRYPT’91.Brighton,UK:Springer-Verlag,1991:490-497.
  • 5Lin Xiaodong,Lu Rongxing,Zhu Haojin,et al.Provably SecureSelf-certified Partially Blind Signature Scheme from BilinearPairings[C]//Proceedings of International Conference onCommunications.Beijing,China:[s.n.],2008:1530-1535.
  • 6张学军.使用双线性对的自认证公钥盲签名[J].计算机工程与应用,2010,46(15):16-17. 被引量:1
  • 7Wang Chao,Han Yunpeng,Li Fagen.A Secure Mobile AgentProtocol for M-commence Using Self-certified Proxy Sign-cryption[C]//Proceedings of International Symposium on Infor-mation Science and Engineering.Shanghai,China:[s.n.],2009:376-380.
  • 8Xiao Youan,Zhou Zude.A New Kind of Self-certified ProxyDigital Signature Scheme[C]//Proceedings of Conference onComputer Science and Software Engineering.Wuhan,China:[s.n.],2008:766-769.
  • 9王之仓,俞惠芳,乔小妮.基于DLP的自认证多接收者签密方案[J].微电子学与计算机,2010,27(11):14-16. 被引量:1

二级参考文献14

  • 1娄建军,王尚平.可认证安全的多接收者签密方案[J].微计算机信息,2008,24(6):76-77. 被引量:3
  • 2张学军.高效的使用双线性对的自认证公钥签名[J].计算机应用,2009,29(2):355-356. 被引量:6
  • 3李梅,李大兴.基于Tate对的指定多接收者签密方案[J].山东大学学报(工学版),2006,36(3):43-45. 被引量:5
  • 4宋文敏,杨广林.一个扩展的基于身份的签密方案[J].微电子学与计算机,2006,23(10):138-140. 被引量:3
  • 5Chaum D.Blind signature for untraceable payments[C]//Advances in Cryptology: Crypto' 82.Berlin, 1982:199-203.
  • 6Girauh M.Self-certified public key[C]//LNCS 434:Proceedings of Eurocrypt' 91 .Berlin : Springer-Verlag, 1991 : 491-497.
  • 7Pointcheval D,Stern J.Provably secure blind signature schemes[C]// Advances in Cryptology-ASIACRYPT'96.Berlin:Springer,1996:252- 265.
  • 8Zhang F G,Kim K.Efficient ID-based blind signature and proxy signature from bilinear pairings[C]//Advances in ACISP 2003.Berlin: Springer, 2003 : 312-323.
  • 9Chen X F,Zhang F G,Liu S LID'based restrictive partially blind signatures and applications[J].The Journal of Systems and Software, 2007,80(2) : 164-171.
  • 10Shao Z H.Self-certified signature scheme from parings[J].The Journal of Systems and Software, 2007,80(2) : 388-395.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部