期刊文献+

标准模型下可证安全的基于身份的门限环签密方案 被引量:4

Provably Secure Identity-based Threshold Ring Signcryption Scheme in Standard Model
下载PDF
导出
摘要 签密是一个能够同时提供认证性和保密性的密码学术语,而它却比分别签名和加密具有更低的计算成本。环签密除具有签密的一般属性外,还具有匿名性。为了设计基于身份的门限环签密方案,利用秘密共享和双线性对技术,提出了一种标准模型下基于身份的门限环签密方案,并对方案的安全性进行了分析。最后,通过计算Diffie-Hell-man问题和判定性Diffie-Hellman问题的困难性,证明了该方案在适应性选择消息和身份攻击下的不可伪造性以及在适应性选择密文攻击下的不可区分性。 Signcryption is a cryptographic primitive which can provide authentication and confidentiality simultaneously with a computational cost lower than signing and encryption respectively,while the ring signcryption has anonymity in addition to authentication and confidentiality. In order to design an identity-based threshold ring signcryption, this paper presented an efficient identity-based threshold ring signcryption scheme without random oracles by means of secret sha- ring and bilinear pairing technique, and gave security analysis of the scheme. At last, we proved this scheme satisfies in- distinguishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen mes- sage and identity attacks in terms of the hardness of DBDH problem and CDH problem.
出处 《计算机科学》 CSCD 北大核心 2013年第5期131-135,共5页 Computer Science
基金 国家自然科学基金资助项目(61075039 61170244) 河南省科技厅科技攻关计划项目(112102210370) 河南省教育厅科学技术研究重点项目(12A520002)资助
关键词 门限环签密 双线性对 计算DIFFIE-HELLMAN问题 判定性Diffie-Hellman问题 基于身份的密码学 Threshold ring signcryption Bilinear pairing Computational Diffie-Hellman problem Decisional bilinear Dif- fie-Hellman problem Identity based cryptography
  • 相关文献

参考文献15

  • 1Shamir A. Identity-based cryptosystems and signature schemes [C]//Proceedings of Crypto 1984. volume 196 of LNCS, 1984: 47-53.
  • 2Boneh D, Franklin M. Identity-based encryption from the Well pairing [ C ] // Proceedings of Crypto 2001. volume 2139 of LNCS, 2001 : 213-229.
  • 3Florian Hess. Efficient identity based signature schemes based on pairings [C] // Proceedings of SAC 2002. volume 2595 of LNCS, 2002 : 310-324.
  • 4Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in the standard model[C]//Proceedings of ACISP 2006. volume 4058 of LNCS, 2006 : 207-222.
  • 5Zheng Yu-liang. Digital signcryption or how to achieve cost(sig- nature & encryption)<<cost (signature) + cost (encryption) [C]// Advances in Cryptology-Crypto 1997. volume 1294 of LNCS, Springer-Verlag, 1997 : 165-179.
  • 6Duan S S,Cao Z F,Lu R X. Robust id-hased threshold signcryp- tion scheme from pairings[C]//Proceedings of the 3rd Interna- tional Conference on Information Security. ACM, 2004:33-37.
  • 7Peng C G, Li X. An identity-based threshold signcryption sch- eme with semantic security[C]//Proceedings of CIS 2005. vol- ume 3802 of LNCS, Springer-Verlag, 2005 : 173-179.
  • 8Li F G, Yu Y. An efficient and provably secure id-hased thre- shold signcryption scheme[C]//Proceedings of ICCCAS 2008. IEEE Press, 2008 : 488-492.
  • 9Zhu Z C,Zhang Y Q,Wang F J. The analysis of an efficient and provably secure i&based threshold signcryption scheme and its secure version [ C] // Proceedings of the Second International Conference on Provable Security. volume 5324 of LNCS, Springer Verlag, 2008 : 210-225.
  • 10Huang Xin-yi, Susilo W, Mu Yi, et al. Identity-based ring sign- cryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world[C]//Proceedings of the 19th International Conference on Advanced Information Net- working and Application 2005. volume 2,2005:649-654.

二级参考文献2

同被引文献27

  • 1祁正华,杨庚,任勋益.一种可证安全的无证书环签密方案(英文)[J].China Communications,2011,8(3):99-106. 被引量:10
  • 2黄欣沂,张福泰,伍玮.一种基于身份的环签密方案[J].电子学报,2006,34(2):263-266. 被引量:17
  • 3Shamir A. How to Share a Secret [ J ]. Communications of the ACM,1979,22( ll ) :612-613.
  • 4Blakley G. Safeguarding Cryptographic Keys [ C ]//Pro- ceedings of AFIPS National Computer Conference. New York, USA : AFIPS Press, 1979 : 313-317.
  • 5Mignotte M. How to Share a Secret E C ]//Proceedings of Workshop on Cryptography. Berlin, Germany: Springer-Verlag, 1983 : 371-375.
  • 6Asmuth C A, Bloom J. A Modular Approach to Key Safeguarding [ J ]. IEEE Transactions on Information Theory, 1983,29 (2) :208-210.
  • 7Karnin E D, Greene J W, Hellman M E. On Sharing Secret Systems[ J ]. IEEE Transactions on Information Theory, 1983,29 ( 1 ) :35-41.
  • 8Bertilsson M, lngemrsson I. A Construction of Practical Secret Sharing Schemes Using Linear Block Codes : C l// Proceedings of AUSCRYPT' 92. Berlin, Germany : Springer- Verlag, 1992:67-79.
  • 9鲁力,胡磊.基于Weil对的多接收者公钥加密方案[J].软件学报,2008,19(8):2159-2166. 被引量:9
  • 10史开泉.P-集合[J].山东大学学报(理学版),2008,43(11):77-84. 被引量:218

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部