期刊文献+

标准模型下广义指定验证者签密 被引量:3

Universal designated verifier signcryption scheme in standard model
下载PDF
导出
摘要 针对现实中签名的安全问题,提出了基于Waters技术的标准模型下安全的广义指定验证者签密方案。签密能够在一个逻辑步骤内同时完成加密和签名的功能。在广义指定验证者签名中,签名持有者即其拥有签名者的签名,能够确认一个指定验证者使其拥有这个签名,而指定验证者不能转移这种认定给其他任何人,仅指定的验证者能够验证签名的存在性。该方案通过广义指定验证者和签密的结合,消除了签名者和签名持有者在签名传输时所需的安全通道。在计算性线性Diffie-Hellman问题假设下,该方案被证明是安全的。和现有的方案相比,所提方案具有较高的计算效率。 Concerning the signature security problem in reality, based on the Waters'technology, a universal designated verifier signcryption scheme in the standard model was proposed. Signcryption is a eryptographic primitive which performs encryption and signature in a single logical step. Universal designated verifier signature allowed a signature holder who had a signature of a signer, to convince a designated verifier that he was in possession of a signer's signature, while the verifier could not transfer such conviction to anyone else, only allowed the designated verifier to verify the existence of the signature. The scheme by combining universal designated verifier and signcryption eliminated the signer and signture holders for signature transmission required for a secure channel. Under the assumption of Computational Bilinear Diffie-Hellman (CBDH) problem, the scheme was proved to be safe. Compared with the existing schemes, the proposed scheme has better computational efficiency.
出处 《计算机应用》 CSCD 北大核心 2014年第2期464-468,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61202438) 中国博士后科学基金资助项目(2011M501427) 西安市科技计划项目(CX1258) 中央高校基础研究支持计划项目(CHD2012JC047)
关键词 签密 广义指定验证者 标准模型 双线性对 signcryption universal designated verifier standard model bilinear pairings
  • 相关文献

参考文献21

  • 1ZHENG Y L. Digital signcryption or how to achieve cost(signature & encryption) <C cost ( signature) + cost ( encryption)[C] // Proceedings of the 17th Annual International Cryptology Con-ference on Advances in Cryptology. Berlin: Springer, 1997: 165 -179.
  • 2BAEK J, STEINFELD R, ZHENG Y L. Formal proofs for the secur-ity of signcryption[ C] // Proceedings of the 5 th International Work-shop on Practice and Theory in Public Key Cryptosystems. Berlin:Springer-Verlag, 2002: 81 -98.
  • 3MALONE-LEE J. Identity-based signcryption[ EB/OL]. [2013-06-14]. http: //eprint. iacr. org/2002 /098. pdf.
  • 4ZHANG Z, MIAN C, JIN Q. Signcryption scheme with thresholdshared unsigncryption preventing malicious receivers [ C ] //TENCON ’02: Proceedings of the 2002 IEEE Region 10 Conferenceon Computers, Communications,Control and Power Engineering.Piscataway: IEEE, 2002: 196-199.
  • 5BOYEN X. Multipurpose identity-based signcryption[ C] // Proceed-ings of the 23 rd Annual International Cryptology Conference on Ad-vances in Cryptology. Berlin: Springer-Verlag, 2003: 383 -399.
  • 6LIBERT B, QUISQUATER J J. Efficient signcryption with key pri-vacy from gap Diffie-Hellman groups[ C]// Proceedings of the 7thInternational Workshop on Theory and Practice in Public Key Cryp-tography on Public Key Cryptography. Berlin: Springer-Verlag,2004: 187 -200.
  • 7DENT A W. Hybrid signcryption schemes with insider security[C]// Proceedings of the 10th Australasian Conference on Informa-tion Security and Privacy. Berlin: Springer-Verlag, 2005: 253 -266.
  • 8STEINFELD R, BULL L, WANG H X, et al. Universal designated-verifier signatures[ C]// Proceedings of the 9th International Confer-ence on the Theory and Application of Cryptology and InformationSecurity. Berlin: Springer-Verlag, 2003: 523 -542.
  • 9ZHANG F, SUSILO W, MU Y, et al. Identity-based universal des-ignated verifier signatures[ C] // Proceedings of the 2000 Embeddedand Ubiquitous Computing - EUC 2005 Workshops. Berlin: Spring-er-Verlag, 2005: 825 -834.
  • 10ZHANG R,FURUKAWA J, IMAI H. Short signature and univer-sal designated verifier signature without random oracles[ C] // Pro-ceedings of the 3rd International Conference on Applied Cryptogra-phy and Network Security. Berlin: Springer-Verlag, 2005: 483 -498.

二级参考文献17

  • 1唐晓东.基于门限方案和椭圆曲线密码体制的数据加密方案[J].计算机工程,2004,30(10):109-110. 被引量:3
  • 2戴元军,杨成.基于椭圆曲线密码体制的(t,n)门限签密方案[J].计算机应用研究,2004,21(9):142-143. 被引量:12
  • 3Steinfeld R,Bull L.Universal Designated-verifier Signatures[C] // Proc.of Advances in Cryptology-Asiacrypt'03.Berlin,Germany:Springer-Verlag,2003.
  • 4Zhang Fanguo,Susilo W.Identity-based Universal Designated Verifier Signature[C] //Proc.of EDC'05 Workshops.Nagasaki,Japan:[s.n.] ,2005.
  • 5Shao Zuhua.Improvement of Digital Signature with Message Recovery and Its Variant Based on Elliptic Curve Discrete Logarithm Problem[J].Computer Standards & Interfaces,2004,27(1):61-69.
  • 6Steinfeld R, Bull L, Wang H, et al.Universal designated-verifier signatures[C]//LNCS 2894: Proceedings of Advances in Cryptology-Asiacrypt' 03, Taipei, Taiwai, November 30-December 4, 2003.Berlin : Springer-Verlag, 2003 : 522-542.
  • 7Zhang Fan-guo, Susilo W, Mu Yi, et al.Identity-based universal designated verifier signature[C]//LNCS 3823: Proceedings of EDC Workshops' 05, Nagasaki, Japan, December 6-9,2005.Berlin: Springer-Verlag, 2005 : 825-834.
  • 8Shao Zu-hua.Self-certified signature scheme from pairings[J]. The Journal of Systems and Sofrware,2007(80):388-395.
  • 9Wang Gui-lin.Universal forgery on a group signature scheme using self-certified public keys[J].Information Processing Letters, 2004 (89) : 227-231.
  • 10Tseng Y, Jan J,Chien H.Digital signature with message recovery using self-certified public keys and its variants[J].Applied Mathematics and Computation, 2003 (136) : 203 -214.

共引文献7

同被引文献23

  • 1赵翔.数字签名综述[J].计算机工程与设计,2006,27(2):195-197. 被引量:23
  • 2Cui H, Mu Y, Au M H. Signcryption secure against linear related-key attacks [J]. The Computer Journal, 2014, 57(10): 1472-1483.
  • 3Enos G, Zheng Y L. An ID-based signcryption scheme with compartmented secret sharing for unsigncryption[J]. Information Processing Letters, 2015, 1!5(2): 128-133.
  • 4Barbosa M, Farshim P. Certificateless signcryption [C] // Proceedings of the 2008 ACM Symposium on Information, Computer and Communications security. ACM, 2008: 369-372.
  • 5Yeh J. The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it[J]. The Journal of Supercomputing, 2014, 70(3): 1100-1119.
  • 6Zhou C X, Zhou W, Dong X W. Provable certificateless generalized signcryption scheme[J]. Designs., Codes and Cryptography, 2014, 71(2): 331-346.
  • 7Tang F, Lin C, Ke P. Universal designated verifier signcryption[C] //Network and System Security. Berlin: Springer, 2012: 126-134.
  • 8LI F G, Liao Y J, Qin Z G. Further improvement of an identity-based signcryption scheme in the standard model[J]. Computers and Electrical Engineering. 2012, 38(2): 413-421.
  • 9Au M H, Chen J, Liu J K, et al. Malicious KGC attack in certificateless cryptography[C]//Pro- ceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. ACM, 2007: 302-311.
  • 10曾梦岐,卿昱,谭平璋,杨宇,周楝淞.基于身份的加密体制研究综述[J].计算机应用研究,2010,27(1):27-31. 被引量:17

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部