期刊文献+

一种新的无证书签密方案 被引量:1

New certificateless signcryption scheme
下载PDF
导出
摘要 对两种无证书签密方案进行了安全性分析,发现两种方案均是不安全的。第一种无证书签密方案不满足不可伪造性,第二种无证书签密方案不能完全满足公开验证性。针对这种情况,提出了一种新的无证书签密方案,同时对新方案进行了正确性分析和安全分析,结果表明新方案是安全的,真正做到了信息方面的保密性和认证性。 This paper analyses the security of two certificateless signcryption schemes, which all can’t guarantee security. The first certificateless signcryption scheme exists forged attack, which can pass through the proving equation. In addi-tion, the second scheme doesn’t completely satisfy the public verification. Based on these problems, this paper proposes a new certificateless signcryption scheme and analyses the accuracy and safety of this new scheme, which is proved to be safe and guarantees the secrecy and authentication of information.
出处 《计算机工程与应用》 CSCD 2014年第5期86-89,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.61173190) 陕西省自然科学基金计划研究项目(No.2009JM8002) 陕西省教育厅科学研究计划基金资助项目(No.2010JK829 No.2010JK398) 中央高校基本科研业务费专项资金资助(No.GK201002041)
关键词 签密 无证书 双线性映射 离散对数问题 signcryption certificateless bilinear map discrete logarithm problem
  • 相关文献

参考文献5

二级参考文献44

  • 1曹正军,刘木兰.数字签名方案中的孤悬因子和冗余数据[J].计算机学报,2006,29(2):249-255. 被引量:15
  • 2李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 3Shamir A.Identity-based cryptosystems and signature schemes[C]// Advances in Cryptology,CRYPTO'84.Berlin:Springer-Verlag,1984: 47-53.
  • 4Boneh D,Franklin M.Identity-based encryption from the weil pairing[J].SIAM Journal of Computing, 2003,32(3) : 586 - 615.
  • 5Boneh D,Lynn B,Shacham H.Short signatures from the weil pairing[C]//Proc Advances in Cryptology-Asiacrypt 2001.Gold Coast, Queensland, Australia:[s.n.], 2001 : 514-532.
  • 6Paterson K G.ID--based signatures from pairings on elliptic curves [J]. Electron Lett, 2002,38 ( 18 ) : 1025-1026.
  • 7Zheng Y.Digital signcryption or how to achieve cost(signature&encry ption ) (cost (signature) +cost ( encryption ) ) [C]//LNCS 1294: Advances in Cryptology-CRYPTO'97,1997: 165-179.
  • 8Zheng Y,Imai H.Efficient signcryption schemes on elliptic curves[J]. Inform Process Letters, 1998,686: 227-233.
  • 9Libert B,Quisquater J J.New identity based signeryption schemes from pairings[EB/OL]. ( 2003-02-24 ).http://eprint.iacr.org/2003/023.
  • 10Cha J C,Cheon J H.An identity-based signature from gap diffiehellman groups[C]//LNCS 2567:Public Key Cryptography,PKC 2003. [S.l.] : Springer-Verlag, 2003 : 18-30.

共引文献79

同被引文献13

  • 1AL-RIYAMI S, PATERSON K. Certificateless public key cryptographyEM']//Advances in Cryptology: ASIACRYPT 2003. Berlin: Springer-Verlag, 2003: 452--473.
  • 2ZHENG Yuliang. Digital signcryption or how to achieve cost (signature & encryption)<<cost(signature)+cost(en- cryption) [M]. Advances in Cryptology: CRYPTO' 97. Ber- lin: Springer-Verlag, 1997 : 165-179.
  • 3BAO F,DENG R H. A signeryption scheme with signature directly verifiable by public key[M]. Public Key Cryptogra- phy. Berlin: Springer-Verlay, 1998 .. 55-59.
  • 4SHIN J B, LEE K, SHIM K. New DSA-verifiable signcryp- tion schemes [M]//Information Security and Cryptology:ICISC 2002, Berlin: Springer Verlag, 2003 : 35-47.
  • 5MALONE-LEE J. Identity-based signeryption [ C/OL 1. (2013-02-16). htpps//www, research gate. net/publica- tion/2534202 Identity Based Signcryption.
  • 6LIBERT B, QUISQUATER ] ], Efficient signcryption with key privacy from gap Diflfie-Hellman groups[M]//Public Key Cryptography: PKC 2004, Berlin: Sprlnger-Verlag, 2004:187-200.
  • 7CHOWSM, YIU SM, HUI LC K,et al. Efficient for- ward and provably secure ID-based signeryption scheme with public verifiability and public ciphertext authenticity [M]//Information Security and Cryptology: ICISC 2003, Berlin.. Springer-Verlag, 2004 : 352-369.
  • 8BARBOSA M, FARSHIM P. Certifieateless signcryption [C]//Proc of the ACM Syrup on Information, Computer and Communications Security ( ASIACCS 2008 ), 2008 : 369-372.
  • 9ARANHA D, CASTRO R, LOPEZ J, et al. Efficient cer- tificateless signcryption[C/OL]. [2011-10-17]. http://sb- seg2008, inf. ufrgs, br/proceedings/data/pdf/st03-01-resu- mo. pdf.
  • 10LIU Z henhua, HU Yupu, ZHANG Xiangsong, et al. Cer- tificateless signcryption scheme in the standard model[J]. Information Sciences, 2010,180 (3) : 452-464.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部