期刊文献+

可证明安全的基于身份的聚合签密方案 被引量:5

Provably secure identity-based aggregate signcryption scheme
下载PDF
导出
摘要 为了更有效地保护网络信息的安全,需要同时实现消息的机密性和认证性。签密方案能够在一个逻辑步骤内同时实现对消息的签名和加密。为了提高当前已存在的签密方案的安全性和算法效率,结合聚合签名的思想,提出一种基于身份的聚合签密方案。在随机语言模型中证明了该方案具有适应性选择密文攻击下的不可区分性,在适应性选择消息攻击下是存在性不可伪造的,其安全性归约为计算椭圆曲线离散对数问题和双线性DiffieHellman问题的困难性。与目前效率较高、密文长度较短的几个方案进行比较的结果表明,新方案的签密和解签密过程分别仅需1次双线性对运算,具有计算成本低、密文长度短的优良特性。 In order to more effectively protect the security of network information, confidentiality and authentication of message need to be realized at the same time. Signcryption performs signature and encryption simultaneously in one logical step. In order to improve safety and efficiency of existing signcryption, an identity-based aggregate signcryption scheme was proposed by combining the ideas of aggregate signature. Under the random oracle model, the scheme was proved to be indistinguishable against adaptive chosen ciphertext attacks, and existentially unforgeable against adaptive chosen messages attacks. The security could be reduced to the elliptic curve discrete logarithm problem and computational bilinear paring Diffe- Hellman problem. Compared with serveral schemes with high efficiency and short key length, the analysis of results shows that the new scheme's signcryption and unsigncryption has only one pairing operation, thus has the excellent features with low computational cost and short length of ciphertext.
出处 《计算机应用》 CSCD 北大核心 2015年第2期412-415,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61303256) 安徽高校自然科学基金资助项目(KJ2013B185) 滁州学院自然科学基金资助项目(2012kj001Z)
关键词 双线性对 签密 聚合签密 随机预言模型 可证明安全 blinear pairing signcryption aggregate signcryption random oracle model provable security
  • 相关文献

参考文献1

二级参考文献21

  • 1祁正华,杨庚,任勋益.Provably Secure Certificateless Ring Signcryption Scheme[J].China Communications,2011,8(3):99-106. 被引量:10
  • 2ZHENG Y. Digital Signcryption or How to Achieve Cost (Signature & Encryption) < < Cost (Signature) + Cost (En?cryption)[C]// Proceedings ofCRYPTO 1997: August 17-21, 1997, Santa Barbara, California, USA. Springer-Verlag, 1997, [NCS 1294: 165-179.
  • 3MALDNE-LEE J. Identity-Based Signcryption[R]. Cryptolo?gy ePrint Archive, Report 2002/098.
  • 4SHAMIR A. Identity-Based Cryptosystern and Signature Scherres [C]// Proceedings of CRYPTO 1984 on Advances in cryptology: August 19-22, 1984, Santa Barbara, California, USA. Springer-Verlag, 1985, [NCS 196: 47-53.
  • 5BONER D, FRANKLIN M. Identity Based Encryption from the Wei! Pairing[J]. SIAM Journal on Computing, 2003,32 (3): 586-615.
  • 6SELVI S, V1VEK S, GOPAI.AKRlSHNAN R, et al. Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scherre [R]. Cryptology ePrint Archive, Report 2008/225.
  • 7BARBOSA M, FARSHIM P. Certificateless Signcryption [C]// Proceedings of ASIACCS 2008: March 18-20, 2008, Tokyo, Japan. ACM Press, 2008: 369-372.
  • 8BONER D, GENTRY C, LYNN B, et al. Aggregate and Verifi?abl Encrypted Signatures from Bilinear Maps [C]// Proceed?ings ofEUROCRYPT 2003: May 4-8, 2003, Warsaw, Poland. Springer-Verlag, 2003, [NCS 2656: 416-432.
  • 9GENTRY C, RAMZAN Z. Identity-Based Aggregate Signa?tures[C]// Proceedings of PKC 2006: April 24-26, 2006, New York, NY, USA. Springer-Verlag, 2006, [NCS 3958: 257-273.
  • 10SELVI S, V1VEK S, SHRIRAM J, et al. Security Analysis of Aggregate Signature and Batch verification Signature Scherres [R]. Cryptology ePrint Archive, Report 2009/290.

共引文献12

同被引文献19

引证文献5

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部