期刊文献+

电子商务签密方案的改进与安全性分析 被引量:2

Improvement and security analysis about signcryption scheme in electronic commerce
下载PDF
导出
摘要 首先介绍了数字签密与传统的"签名+加密"的方法相比所具有的优势,并给出了构成数字签密方案的四个子算法。然后简要介绍了签密方案涉及到的数学基础,并对现有的几种标准模型下的基于身份的数字签密方案进行了回顾,对Yu等所提方案的安全性进行了分析,指出它在挑选密文攻击方面是不安全的。接下来提出一种改进的数字签密方案,分别对构成该方案的系统建立、密钥提取、数字签密、解签密四个子算法进行了分析。从适应性选择消息下的不可伪造性和选择密文攻击下的密文不可区分性两个方面对方案的安全性进行了简要的说明。最后对改进方案的效率与其它几种方案进行了比较,得出了改进的方案在密文长度等方面存在一定优势的结论,并提出了下一步的研究计划。 Firstly, the paper presents the advantage of digital signcryption over the traditional "sig- nature+encryption" method, and describes the four sub-algorithms which compose the digital signcryp- tion scheme. Secondly, it briefly introduces the mathematical basis of the digital signcryption, reviews several existing identity-based digital signcryption schemes under the standard model. It analyses the se- curity of the digital signcryption scheme designed by Yu, and points out that it is insecure when it is at- tacked by select ciphertext. Thirdly, it gives an improved digital signcryption scheme, and respectively analyses the digital signcryption scheme consisting of four sub-algorithms-the system establish algo- rithm, the key extraction algorithm, the digital signcryption algorithm and the unsigncryption algo- rithm. The scheme's security is briefly described through the two aspects of unforgeability under adap- tive select message and ciphertext indistinguishability under select ciphertext attack. Finally, the paper compares the efficiency of the improved scheme with other schemes, concluding that the improved scheme is superior at ciphertext size etc, then puts forward plans for future research.
作者 许德武
出处 《计算机工程与科学》 CSCD 北大核心 2013年第7期77-81,共5页 Computer Engineering & Science
基金 浙江省教育厅基金资助项目(Y201120829) 浙江省自然科学基金资助项目(Y1110483)
关键词 数字签名 解签密 数字签密 安全 效率 digital signature unsigncryption digital signcryption security efficiency
  • 相关文献

参考文献10

  • 1Zheng Y. Digital signcryption or how to achieve cost(Signa-ture\ Encryption) < < Cost ( Signature) + Cost ( Encryp-tion) [C]//Proc of CRYPTO,97,1997:165-179.
  • 2Malone-Lee J. Identity based signcryption[R]. Report 2002/098,2002.
  • 3Wu Q, Mu Y, Susilo W, et al. Efficient signcryption withoutrandom oracles[C] // Proc of Autonomic and Trusted Compu-ting-ATC,06,2006:449-458.
  • 4Tan C H. Analysis of improved signcryption scheme with keyprivacy [J]. Information Processing Letters, 2006, 99 (4):135-138.
  • 5Waters B. Efficient identity-based encryption without randomoracle[C] // Proc of Advances in Cryptology-Eurocrypty 05 ,2005:114*127.
  • 6Yu Y, Yang B,Sun Y,et al. Identity-based signcryptionscheme without random oracles[J]. Computer StandardsInterfaces, 2009,31 (1) : 56-62.
  • 7Paterson K G,Schuldt J C N. Efficient identity-based signa-tures secure in the standard model[C] // Proc of InformationSecurity and Privacy-ACISP,06,2006 :207-222.
  • 8Chow S S M,Yiu S M,Hui L C K,et al. Efficient forward andprovably secure ID-based signcryption scheme with publicverifiability and public ciphertext authenticity[C] // Proc ofInformation Security and Cryptology-ICISC , 03,2003 : 352-369.
  • 9Gamage C,Leiwo J,Zheng Y. Encrypted message authentica-tion by firewalls [C] // Proc of Public Key Cryptography-PKCT99,1999:69-81.
  • 10许德武,陈伟.基于椭圆曲线的数字签名和加密算法[J].计算机工程,2011,37(4):168-169. 被引量:13

二级参考文献6

  • 1Miyaji A. Elliptic Curves Suitable for Cryptosystems[J]. IEICE Trans. on Fundamentals, 1994, 77(1): 98-105.
  • 2Johson D, Menezes A. The Elliptic Curve Digital Signature Algorithm[R]. Department of Combinatories and Optimization, University of Waterloo, Tech. Rep.: CORR 99-21, 1999.
  • 3Koblitz N. Elliptic Curve Cryptosystems[J]. Mathematics of Computation, 1987, 48(7): 203-209.
  • 4HANKERSON D, MENEZES A, VANSTON S. 椭圆曲线密码学导论[M].张焕国,译.北京:电子工业出版社,2005.
  • 5杨青,辛小龙,戢伟.基于椭圆曲线的数字签名和代理数字签名[J].计算机工程,2008,34(23):147-149. 被引量:11
  • 6张龙军,沈钧毅,赵霖.椭圆曲线密码体制安全性研究[J].西安交通大学学报,2001,35(10):1038-1041. 被引量:22

共引文献12

同被引文献33

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部