期刊文献+

标准模型下基于身份的多接收者签密密钥封装 被引量:3

Identity-based multi-recipient signcryption key encapsulation in the standard model
下载PDF
导出
摘要 签密密钥封装机制能同时实现封装密钥的机密性和认证性。以Wa-IBE加密方案和PS-IBS签名机制为基础,提出一种标准模型下的身份基签密密钥封装机制(IBSC-KEM)和多接收者签密密钥封装机制(mIBSC-KEM)。新方案中的签名算法直接采用了PS-IBS签名,密钥封装算法采用了变形的WaIBE加密方案。因此,新方案的不可伪造性和机密性在标准模型下分别被规约为破解PS-IBS签名与WaIBE加密,具有可证明安全性。新方案可用于构建标准模型下安全的一对一和多对一认证与密钥交换方案。 Signcryption key encapsulation mechanism can simultaneously achieve the confidentiality and authentication of the key. Based on the Wa-IBE encryption and the PS-IBS signature, we propose an identity-based signcryption key encapsulation mechanism (IBSC-KEM) and an identity-based multi-recipient signcryption key encapsulation mechanism (mIBSC-KEM) in the standard model. PS-IBS signature is adopted in the new schemes as a signature algorithm and a variant of Wa-IBE encryption is used by the key encapsulation algorithm. Therefore, the unforgeability and confidentiality of the new schemes are verified in the standard model, and are deduced toward cracking the PS-IBS signature and the Wa-IBE encryption respectively. The new schemes can be used to build secure one-to-one or many- to-one authentication and key exchange schemes.
作者 陈明
出处 《计算机工程与科学》 CSCD 北大核心 2015年第4期719-725,共7页 Computer Engineering & Science
关键词 基于身份密码学 多接收者签密 密钥封装 标准模型 identity-based cryptography multi-recipient signcryption key encapsulation standard model
  • 相关文献

参考文献4

二级参考文献42

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2Zheng Y. Digital signcryption or how to achieve cost (Signature & Encryption ) cost ( Signature ) + cost (Encryption) [G]//LNCS 1294 : Advances in Cryptology- Crypto'97. Berlin: Springer, 1997:165-179
  • 3Zheng Y. Identification, signature and signcryption using high order residues modulo an RSA composite [C] HLNCS 1992: Proc of PKC'01. Berlin: Springer, 2001:48-63
  • 4Zheng Y. Signcryption and its applications in efficient public key solutions [C] //LNCS 1397: Proc of ISW'97. Berlin: Springer, 1998:291-312
  • 5Yum B H, Lee P J. New signcryption schemes based on KCDSA [C] //LNCS 2288: Proc of ICISC'01. Berlin: Springer, 2001:305-317
  • 6Cramer R, Shoup V. Design and analysis of practical publickey eneryption schemes secure against adaptive chosen eiphertext attack [J]. SIAM Journal on Computing, 2003, 33(1): 167-226
  • 7Dent A W. Hybrid signcryption schemes with outsider security [C] //LNCS 3650: Proc of ISC 2005. Berlin: Springer, 2005:203-217
  • 8Shamir A. Identity-based cryptosystems and signature schemes [C] //LNCS 196: Advances in Cryptology- Proceedings of CRYPTO'84. Berlin: Springer, 1985:48-53
  • 9Boneh D, Franklin M. Identity based eneryption from the weil pairing [C]//LNCS 2139: Advances in Cryptology Crypto 2001. Berlin: Springer, 2001:213-229
  • 10Lee J M. Identity based signcryption [OL]. [2002-07-19]. http://eprint. iacr. org/2002/098

共引文献19

同被引文献23

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部