期刊文献+

前向安全的可公开验证无证书混合签密方案 被引量:5

Certificateless Hybrid Signcryption with Forward Security and Verifiability
下载PDF
导出
摘要 签密高效地解决了在一个逻辑步骤内不能同时完成对消息签名和加密的问题.无证书混合签密方案解决了传统公钥密码体制的证书管理问题和消息长度受限问题、基于身份密码体制的密钥托管问题.本文提出一个新的无证书混合签密方案.方案利用双线性对,将无证书签密和混合加密相结合,并在随机预言机模型中利用双线性Diffie-Hellman假设证明了方案的机密性,利用计算性Diffie-Hellman假设证明了方案的不可伪造性.方案还满足可公开验证性和前向安全性,与同类方案相比具有更高的安全性;在密文长度相当的情况下,运算量更小,效率更高. Signcryption fulfills the function of the digital signature and the public key encryption in a single logical step. While the cer- tificateless hybrid signcryption can solve the problem of the management of CA in public key encryption system and key trustee in the IBE encrypfion system, it also can handle messages of arbitrary length. We put forward a certificateless hybrid signcryption scheme which combined the certificateless signcryption with the hybrid encryption based on bilinear pairings, the scheme turn out to be secure and efficient, and it is proved to be confidential under the assumption of bilinear Diffie-Hellman problem and unforgeable under the as- sumption of compute Diffie-Hellman problem. The new scheme includes verifiability and forward security, it is more secure than the homogeneous schemes, and more efficient when the length of the ciphertext is almost the same.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第12期2814-2817,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61103231 61103230 61272492)资助 陕西省自然科学基础研究计划项目(2011JM8012)资助
关键词 无证书混合签密 双线性对 可公开验证 前向安全 certificateless hybrid signcryption pairing verifiability forward security
  • 相关文献

参考文献1

二级参考文献1

共引文献14

同被引文献44

  • 1褚一平,陈勤.分解RSA模数算法研究[J].微机发展,2005,15(6):91-92. 被引量:2
  • 2田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16
  • 3Cramer R,Shoup V.Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack[J].SIAM Journal on Computing,2004,33(1):167-226.
  • 4Abe M,Gennaro R,Kurosawa K.Tag-KEM/DEM:a new framework for hybrid encryption[J].Journal of Cryptology,2008(21):97-130.
  • 5Kurosawa K,Desmedt Y.A new paradigm of hybrid encryption scheme[C]//Proceedings of the 24th Annual International CryptologyConference.Santa Barbara,California,USA,2004:426-442.
  • 6Fujisaki E,Okamoto T.Secure integration of asymmetric and symmetric encryption schemes[C]//Proceedings of CRYPTO’99,Lecture Notes in Computer Science Volume 1666,1999:537-554.
  • 7赖欣.混合密码体制的理论研究与方案设计[D].西安:西安交通大学,2005.
  • 8Dent A.Hybrid signcryption schemes with insider security[C]//Proceedings ofthe 10th Australasian Conference on Information Security and Privacy,Lecture Notes in Computer ScienceVolume 3574,Brisbane,Australia,2005:253-266.
  • 9Dent A.Hybrid signcryption schemes with outsider security[C]//Proceedings ofthe 8th International Information Security Conference,Lecture Notes in Computer ScienceVolume3650,Singapore,2005:203-217.
  • 10Singh K.Identity-based hybrid signcryption revisited[C]//Proceedings of the 2012International Conference on Information Technology and e-Services,Washington,2012:34-39.

引证文献5

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部