期刊文献+

基于身份的新型广播签密方案 被引量:2

Novel Identity Based Broadcast Signcryption Scheme
下载PDF
导出
摘要 为了适应当前信息传输环境的多样性及多变性,保证传输信息的机密性及权威性,通过借鉴签密方案的优势并结合广播加密模型,提出一种新的身份型广播签密方案。该方案使用哈希运算、环和运算、双线性对运算等多种运算形式,使得新方案中公、私钥长度保持不变,密文长度等于接收用户的个数加1,签密过程与解签密过程均无需双线性对运算,因此具有较低的运算代价及存储代价。详细的安全性证明显示该方案的机密性可归约为弱的BCDH问题,不可伪造性可归约为PSG签名问题,从而使该方案能应用于安全性和实用性要求较高的环境。 A novel identity based broadcast signcryption scheme was proposed to satisfy the diversity and changeability of the current data transmission environment, and guarantee the confidentiality and authority of the transferred informa- tion using the integration of the broadcast encryption, the identity-based cryptography and the signcryption. By means of this scheme, taking the various arithmetic operation such as hash, ring add and bilinear pairing et al. , the size of cipher- text is equal to the number of the receiver adding one, and the size of public or private key keeps constant. Simultane ously, the process of signcryption or unsigncryption needs not bilinear pairing operation with high computational cost and storage cost. The detailed proof of security shows that the proposed scheme is not only to be IDN-CCA2 secure un- der the weak BCDH problem but also to be existentially unforgeable under the EF-ACMA of PSG proposed by Pater- son. Furthermore, the proposed scheme is efficient and practical at performance.
作者 孙瑾 胡予濮
出处 《计算机科学》 CSCD 北大核心 2013年第2期124-128,共5页 Computer Science
基金 国家自然科学基金项目(60970119) 陕西省教育厅自然科学基金项目(11JK0505)资助
关键词 签密 广播签密 基于身份的密码 可证明安全 Signcryption,Broadcast signcryption,Identity based cryptography,Provably secure
  • 相关文献

参考文献16

  • 1Zheng Y. Digital signcryption or How to Achieve Cost (Signature Encryption)≤Cost (Signature) + Cost (Encryption)[A].Beilin:Springer-Verlag,1997.165-179.
  • 2Baek J,Steinfeld R,Zheng Y. Formal proofs for the security of signcryption[A].Beilin:Springer-Verlag,2002.80-98.
  • 3Shamir A. Identity-based cryptosystems and signature schemes[A].Springer-verlag,1984.47-53.
  • 4Malone-Lee J. Identity Based Signcryption[Report 2002/098.][R].Cryptology e-Print Archive,2002.
  • 5Boneh D,Goh E,Nissim K. Evaluating 2-dnf formulas on ciphertexts[A].Beilin:Springer-Verlag,2005.325-342.
  • 6Lal S,Kushwah P. ID-based generalized signcryption[EB/OL].Cryptology ePrint Archive,Report 2008/84,2008.
  • 7Yu G,Ma X,Shen Y. Provable secure identity based generalized signcryption scheme[cs.CR][M].2010.
  • 8Sharmila D S S,Sree Vivek S,Pandu Rangan C. A note on the security identity based online/offline encryption scheme[cs.CR][OL].http://eprint.iacr.org/2010/178,2010.
  • 9Ji H,Han W,Zhao L. Certificateless generalized signcryption[EB/OL].http://eprint.iacr.org/2010/204.pdf,2010.
  • 10Chen L,Malone-Lee. Improved Identity-Based Signcryption[A].Beilin:Springer-Verlag,2005.362-379.

同被引文献21

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部