期刊文献+

基于身份的跨信任域签密方案 被引量:3

Identity-based Signcryption Cross Autonomous Domains
下载PDF
导出
摘要 实际网络环境尤其是未来异构网络融合环境中,各个信任域大多都是独立的自治域,使用不同的系统参数。为此提出了一种新的基于身份的跨信任域签密方案,该方案对PKG系统参数不作限制,各PKG可以使用完全不同的系统公开参数、不同的主密钥和公钥。并且在该签密协议的基础上给出了会话密钥的生成方法。在随机预言模型中给出了安全性证明,在BDH问题是困难的的假设下该协议是安全的,其满足机密性、不可伪造性、不可否认性和公开验证性。在与其他跨信任域签密方案计算开销相当的情况下,该方案不仅实现了跨信任域签密,而且对各PKG参数不作限制。 Real networks especially heterogeneous networks consist of several cooperating sub-networks which belong to different trust domains which are independent and autonomous. The trust domains are maintained by different PKGs. A novel ID-based cross-domain signcryption scheme was proposed which is no restriction on PKG system parameters so that public system parameters, system master keys and system public keys can be totally different. Based upon this signcryption scheme, a cross-domain session key generation scheme was presented. Our cross-doamin signcryption protocol was proved to be secure in the random oracle model assuming the bilinear Diffle-Hellman problem is hard. It satisfies the basic security requirements confidentiality, unforgeability, non-repudiation and public verifiability. The scheme not only achieves cross-domain signcryption, but also makes no restriction on PKG system parameters on condition that computation overheads are little increased.
出处 《计算机科学》 CSCD 北大核心 2015年第5期165-168,共4页 Computer Science
基金 国家自然科学基金资助项目(61201220)资助
关键词 基于身份 签密 跨信任域 密钥协商 Identity-based, Signcryption, Cross-domain, Key agreement
  • 相关文献

参考文献10

  • 1Adi S.Identity-based cryptosystems and signature schemes [C]∥Advances in Crypto'84.Springer-Verlag,1984:47-53.
  • 2Dan B,Matt F.Identity based encryption from the Weil paring [C]∥Advances in Crypto'01.Springer-Verlag,2001:213-229.
  • 3Zheng Yu-liang. Digital Signcryption or How to Achieve Cost (Signature & Encryption)<<Cost(Signature) +Cost(Encryp- tion) [C]//Advances in Crypto' 97. Springer-Verlag, 1997, 1294:165-179.
  • 4Malone-Lee John.Identity-based signcryption [R].Cryptology ePrint Achive,Report 2002/098.
  • 5Hess Florian.Efficient identity based signature scheme based on Parings[C]∥Proceeding of the 9th Workshop on Selective Areas on Cryptography (SAC 2002).Springer-Verlag,2002,2595.
  • 6路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32
  • 7Li Fa-gen,HuYu-pu,Zhang Chuan-rong.An identity based signcryption scheme for multi-domain Ad Hoc Networks[C]∥Proceeding of ACNS 2007.2007,4521:373-384.
  • 8Sunder L,Prashant K.Multi-PKG based signcryption [R].Cryptology ePrint Archive,Report 2008/050.
  • 9张红旗,张文波,张斌,曹炳华.网格环境下基于身份的跨域认证研究[J].计算机工程,2009,35(17):160-162. 被引量:13
  • 10朱重,吴国新.分布式多信任域信任管理技术研究综述[J].计算机科学,2011,38(4):38-42. 被引量:5

二级参考文献38

  • 1路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32
  • 2李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 3Foster I, Kesselman C, Tsudik G, et al. A Security Architecture for Computational Grids[C]//Proceedings of the 5th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 1998: 83-92.
  • 4Wenbo M. An Identity-based Non-interactive Authentication Framework for Computational Grids[R]. Hewlett-Packard Laboratories, Technical Report: HPL-2004-096, 2004.
  • 5Li Hongwei, Sun Shixin. Identity-Based Cryptography for Grid[C]// Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/ Distributed Computing. Washington, USA: IEEE Computer Society 2007: 132-137.
  • 6Yan Z, Cofta P. Methodology to Bridge Different Domains of Trust in Mobile Communications [C]//The 1st International Conference on Trust Management(iTrust'03). LNCS vol. 2692/ 2003. Greece, May 2003 : 211-224.
  • 7Lee A J, Yu Ting. Towards a Dynamic and Composite Model of Trust[C]//Proceedings of the 14th ACM Symposium on Access Control Models and Technologies(SACMAT 2009). June 2009.
  • 8Casare S, Sichman J. Towards a functional ontology of reputation[C]//Proceedings of the Fourth International Joint Confe- rence on Autonomous Agents and Multiagent Systems. The Netherlands, July 2005.
  • 9Pinyol I, Sabater-Mir J, Cuni G. How to talk about reputation using a common ontology:From defilaition to implementation[C]// Ninth Workshop on Trust in Agent Societies. 2007:90-102.
  • 10Branchaud M,Flinn S. xTrust: A scalable trust management infrastructure[C] // Proceedings of Privacy, Security and Trust. Fredericton,Canada, 2004:207-218.

共引文献45

同被引文献21

引证文献3

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部