期刊文献+

基于环Z_n圆锥曲线上的签密方案

SIGNCRYPTION SCHEME BASED ON CONIC CURVE OVER RING Z n
下载PDF
导出
摘要 相比于传统的"先签名后加密"方法,签密方案使得在同一个逻辑步骤中完成两项密码变换功能。利用圆锥曲线上的公钥密码体制和签密体制建立一个同时完成数字签密和加密两项功能的签密体制,并证明在基于圆锥曲线上离散对数和大数分解双重困难问题下,方案是安全的。最后和现有的方案[3]进行比较说明该方案在效率方面优于文献[3]的方案。 Compared with traditional signature-then-encryption approach, signcryption scheme enables two cryptographic transformation functions to be fulfilled in same logical procedure. It makes use of the public key cryptosystem and signcryption scheme on conic curve functions to establish a signcryption system to complete both the functions of digital signcryption and encryption simultaneously, and proves that in dual difficulties problem of the discrete logarithm based on conic curve and large number factorisation, this scheme is secure. Finally, by comparing the scheme with existing protocol, it shows that this scheme outperforms the literature schemes in efficiency.
出处 《计算机应用与软件》 CSCD 北大核心 2013年第10期162-164,219,共4页 Computer Applications and Software
基金 陕西省自然科学基金项目(2009JQ1009) 陕西省自然科学专项基金项目(09JK803) 咸阳师范学院专项科研基金项目(11XSYK305)
关键词 签密 圆锥曲线 环Zn Signcryption Conic curve Ring Zn
  • 相关文献

参考文献13

  • 1Zheng Y. Digital signcryption or how to achieve cost ( signature & encryption). Cost (signature) + cost ( encryption ) [ C ]//Advances in Cryptology-CRYPTO' 97, LNCS 1294, Springer-Verlag, 1997:165 - 179.
  • 2Boneh D, Franklin M. Identity-based encryption from the weil pairing [ C ]//Advances in Cryptolog-CR-YPTO 2001, LNCS 2139, Springer- Verlag, 2001:213 -229.
  • 3Malone-Lee J. Identity based signcryption[R/OL]. Cryptology ePrint Archive, Report 2002/098, 2002. http://eprint. iacr. org/2002/ 098, 2002 -07 -20/2011 - 11 -22.
  • 4庞辽军,崔静静,李慧贤,裴庆祺,姜正涛,王育民.新的基于身份的多接收者匿名签密方案[J].计算机学报,2011,34(11):2104-2113. 被引量:14
  • 5张秋璞,叶顶锋.对一个基于身份的多重签密方案的分析和改进[J].电子学报,2011,39(12):2713-2720. 被引量:8
  • 6孙琦,朱文余,王标.环Z_n上圆锥曲线和公钥密码协议[J].四川大学学报(自然科学版),2005,42(3):471-478. 被引量:44
  • 7Dai Zongduo, Pei Dingyi, Yang Junhui, et al. Cryptanalysis of a public key cryptosystem based on conic curves [ C ]//The International Work- shop on Cryptographic Techniques & E-Commerce , Hong Kong ,2000.
  • 8Wiener M J. Cryptanalysis of short RSA secret exponents [J]. IEEE Trans Inf Theory, 1990,36 ( 3 ) :553 - 558.
  • 9王标,方颖珏,林宏刚,李轶.基于环Z_n上圆锥曲线的QV签名方案[J].中国科学(F辑:信息科学),2009,39(2):212-217. 被引量:3
  • 10孙琦,彭国华,朱文余,等.环Zn上圆锥曲线RSA型公钥密码体系和抗小私钥d攻击[C]//密码学进展-Chinacrypt.北京:中国科学技术出版社,2006.

二级参考文献55

  • 1朱文余,孙琦.环Z_n上椭圆曲线的密钥交换协议[J].电子学报,2005,33(1):83-87. 被引量:14
  • 2孙琦,朱文余,王标.环Z_n上圆锥曲线和公钥密码协议[J].四川大学学报(自然科学版),2005,42(3):471-478. 被引量:44
  • 3王标,朱文余,孙琦.基于剩余类环Z_n上圆锥曲线的公钥密码体制[J].四川大学学报(工程科学版),2005,37(5):112-117. 被引量:20
  • 4张明志.用圆锥曲线分解整数[J].四川大学学报(自然科学版),1996,33(4):356-359. 被引量:30
  • 5Duan S, Cao Z. Efficient and provably secure multi receiver identity based signcryption//Proceedings of the Information Security and Privacy llth Australasian Conference. Mel- bourne, Australia, 2006:195-206.
  • 6Lal S, Kushwah P. Anonymous ID based signcryption scheme for multiple receivers. Cryptology ePrint Archive.. Report 2009/345.
  • 7Yu Y, Yang B, Huang X, Zhang M. Efficient identity-based signcryption scheme for multiple receivers//Proceedings of the Autonomic and Trusted Computing 4th International Conference. Hong Kong, China, 2007: 13-21.
  • 8Sharmila S, Sree S, Srinivasan R, Pandu C. An efficient identity-based signcryption scheme for multiple receivers// Proceedings of the Advances in Information and Computer Security 4th International Workshop on Security. Toyama, Japan, 2009:71-88.
  • 9Elkamehouehi H, Abouelseoud Y. MIDSCYK.. An efficient provably secure multirecipient identity-based signcryption scheme//Proceedings of the International Conference on Net working and Media Convergence. Cairo, Egypt, 2009:70-75.
  • 10Qin H, Dai Y, Wang Z. Identity-based multi-receiver threshold signcryption scheme. Security and Co:xxmunieation Networks, 2010, 3(6): 535-545.

共引文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部