期刊文献+

基于HECC的门限群签密研究 被引量:1

Threshold Group Signcryption based on HECC
下载PDF
导出
摘要 分析了已有的门限群签密方案,针对现有方案中抗合谋攻击及身份追查等不足的问题,在(t,n)门限签密的基础上,基于HECC提出了一种可抗合谋攻击、身份可追查的高安全性门限群签密方案。该方案在可抵御合谋攻击的同时,可分辨攻击是来自于群成员还是外部,并可针对群成员的欺诈行为进行身份追查。该方案的安全性是建立在超椭圆曲线离散对数问题的难解性上,在保障安全的同时,也具备了HECC的诸多优点。 This paper analyzes the existing threshold group signcryption schemes,and aiming at the problems of anti-conspiracy attack and limited identity-tracing and with( t,n) signcryption as the basis,proposes a more secure threshold group signcryption scheme based on HECC( Hyperelliptic Curve Cryptosystem). This scheme could effectively resist conspiracy and distinguish between external attacks and internal attacks,and meanwhile carry out identity-tracing in accordance with the fraudulent practice of group members. Scheme security relies on the difficult solution of discrete logarithm problem of hyperelliptic curve,and thus to guarantee security while enjoy many advantages of HECC.
作者 冯阳 汪学明
出处 《通信技术》 2015年第5期607-610,共4页 Communications Technology
基金 国家自然科学基金项目[2011]61163049 贵州省自然科学基金项目黔科合J字[2011]2197~~
关键词 门限群签密 超椭圆曲线密码体制 合谋攻击 身份追查 threshold group signcryption HECC conspiracy attack identity-tracing
  • 相关文献

参考文献10

  • 1ZHENG YU-liang. DigitalSigneryption or How to Achie- vecost ( Signature& Encryption ) < < Cost ( Signature ) + Cost (Encryption) [ C ]//Proc of the 17th Annual International Cryptology Conference on Advances in Crytology. Berlin: Springer-Verlag, 1997 : 165-179.
  • 2雷咏,杨世平.基于PKI的签密体制[J].通信技术,2013,46(1):43-46. 被引量:6
  • 3WANG C T, CHANG C C, LIN C H. Generalization of- Threshold Signature and Authenticated Encryption for Group Communications[ J]. IEICE Transactions on Fun- damentals, 2000, E83-A (6): 1228-1237.
  • 4Hsu C L,Wu T S,Wu T C. Improvements of Generaliza- tion of Threshold Signature and Authenticated Encryption for Group Communications [ J ]. Information Processing Letters. 2002, 81 ( 1 ) :41-45.
  • 5彭长根,李祥,罗文俊.一种面向群组通信的通用门限签密方案[J].电子学报,2007,35(1):64-67. 被引量:14
  • 6冯君,汪学明.一种高安全的门限群签密方案[J].计算机应用研究,2013,30(2):503-506. 被引量:6
  • 7Sharmir A. ttow to Share a Secret [ J ]. Communication of the ACM, 1979, 22( 11 ) :612-6130.
  • 8Pedersen T P. Distributed Provers with Applications to Undeniable Signatures. [ C ]//Euroerypt '91, Lecture Notes in Computer Science 547 . New York: Springer- Verlag, 1991. 221-238.
  • 9Solinas J. Efficient Arithmetic on Koblitz Curves [ J ], Designes, Codes and Cryptography 19 ( 2000 ), 195-249.
  • 10Blake I, Seroussi G, Smart N. Elliptic Curves in Cryp- tography [ J ]. Cambridge : University Press, 1999.

二级参考文献31

  • 1戴元军,杨成.基于椭圆曲线密码体制的(t,n)门限签密方案[J].计算机应用研究,2004,21(9):142-143. 被引量:12
  • 2彭长根,李祥,罗文俊.一种面向群组通信的通用门限签密方案[J].电子学报,2007,35(1):64-67. 被引量:14
  • 3龙芳.数字签名算法研究[J].信息安全与通信保密,2007,29(5):143-145. 被引量:4
  • 4Yuliang Zheng.Signcryption and its application in efficient public key solutions[A].LNCS1396,Information Security Workshop (ISW'97)[C].Berlin:Springer-Verlag,1997.291-312.
  • 5Chien-Lung Hsu,Tzong-Chen Wu.Authenticated encryption scheme with shared verification[J].IEE-Computer Digital Technology,1998,145(2):117-120.
  • 6Ching-Te Wang,Chin-Chen Chang,Chu-Hsing Lin.Generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals,2000,E83-A(6):1228-1237.
  • 7Yuh-Min Tseng,Jinn-Ke Jan,Hung-Yu Chien.On the security of generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals,2001,E84-A(10):2606-2609.
  • 8Chien-Lung Hsu,Tzong-Sun Wu,Tzong-Chen Wu.Improvements of generalization of threshold signature and authenticated encryption for group communication[J].Information Processing Letter,2002,81(1):41-45.
  • 9Shuhong Wang,Guilin Wang,Feng Bao,Jie Wang.Security notes on generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals,2004,E87-A(12):3443-3446.
  • 10T P Pedersen.Distributed provers with applications to undeniable signatures[A].LNCS 547,Proc.of Eurocrypt'91[C].Berlin:Springer-Verlag,1991.221-242.

共引文献22

同被引文献6

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部