期刊文献+

可证安全的紧致无证书聚合签密方案 被引量:16

Provable Secure and Compact Certificateless Aggregate Signcryption Scheme
下载PDF
导出
摘要 无证书聚合签密不仅可以保证信息传输的机密性和认证性,还可以降低密文的验证和通信开销。分析现有无证书聚合签密方案,发现它们的计算效率普遍较低。该文提出一个紧致的无证书聚合签密方案,方案聚合验证密文信息需要的双线性对个数固定,并且与签密用户个数无关。与已有无证书聚合签密方案相比,新方案减少了双线性对运算个数,提高了聚合验证效率。同时,在随机预言模型下,基于双线性Diffie-Hellman困难问题和计算Diffie-Hellman困难问题,证明方案满足机密性和不可伪造性。 Certificateless aggregate signcryption not only can ensure the confidentiality and authentication of information transmission, but also can reduce the cost of data communication and the verification of ciphertexts.Through analyzing some existing certificateless aggregate signcryption schemes, it is found that their efficiencies are much lower. A provable secure certificateless compact aggregate signcryption scheme is proposed in this paper.In the new scheme, the pairing numbers, not depending on the number of signcryption users, are constant when aggregate ciphertexts are verified. Compared with the existing certificateless aggregate signcryption schemes, the new scheme decreases pairing numbers and raise the efficiency of verification. Moreover, based on the assumption of bilinear Diffie-Hellman and computational Diffie-Hellman, in the random oracle model, it is proved that the new scheme satisfies the properties of confidentiality and unforgeability.
出处 《电子与信息学报》 EI CSCD 北大核心 2015年第12期2838-2844,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61163038 61262056 61262057) 甘肃省高等学校科研项目(2015B-220) 西北师范大学青年教师科研能力提升计划项目(NWNU-LKQN-12-32)~~
关键词 无证书签密 聚合签密 双线性Diffie-Hellman困难问题 计算Diffie-Hellman困难问题 公开验证 Certificateless signcryption Aggregate signcryption Bilinear Diffie-Hellman problem Computational Diffie-Hellman problem Public verification
  • 相关文献

参考文献6

二级参考文献83

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2Al-Riyami S S and Paterson K G.Certificateless public key cryptography[C].ASIACRYPT 2003,Berlin:Springer-Verlag,2003,LNCS 2894:452-473.
  • 3Shamir A.Identity-based cryptosystems and signature schemes[C].CRYPTO 1984,Berlin:Springer-Verlag,1984,LNCS 196:47-53.
  • 4Boneh D and Franklin M.Identity-based encryption from the Weil pairing[C].CRYPTO 2001,Berlin:Springer-Verlag,2001,LNCS 2139:213-229.
  • 5Zheng Y.Digital signcryption or how to achieve cost (Signature & encryption) 《《 cost(Signature) + cost (Encryption)[C].CRYPTO 1997,Berlin:Springer-Verlag,1997,LNCS 1294:165-179.
  • 6An JH,Dodis Y,and Rabin T.On the security of joint signature and encryption[C].EUROCRYPT 2002,Berlin:Springer-Verlag,2002,LNCS 2332:83-107.
  • 7Boyen X.Multipurpose identity-based signcryption:a swiss army knife for identity-based cryptography[C].Cryptology -CRYPTO 2003,Berlin:Springer-Verlag,2003,LNCS 2729:383-399.
  • 8Barreto PSLM,Libert B,McCullagh N,and Quisquater J J.Efficient and provably-secure identity-based signatures and signcryption from bilinear maps[C].Asiacrypt 2005,Berlin:Springer-Verlag,2005,LNCS 3788:515-532.
  • 9Barbosa M and Farshim P.Certificateless signcryption[C].ACM Symposium on Information,Computer and Communications Security-ASIACCS 2008,Tokyo,Japan,2008:369-372.
  • 10Wu Chen-huang and Chen Zhi-xiong.A new efficient certificateless signcryption scheme[C].International Symposium on Information Science and Engieering,Shanghai,China,IEEE Computer Society,2008:661-664.

共引文献53

同被引文献76

引证文献16

二级引证文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部