期刊文献+

可证安全的无证书签密方案 被引量:4

A PROVABLY SECURE CERTIFICATELESS SIGNCRYPTION SCHEME
下载PDF
导出
摘要 研究了几种新近提出的无对运算的无证书签密方案,发现存在正确性或安全性的缺陷,提出一种新的无对运算的无证书签密方案。新签密方案改变了现有方案的线性密钥结构,能抵抗类型I敌手发起的公钥替换攻击;利用哈希函数将签密者和解签密者的身份以及待签密消息进行绑定,防止内部攻击发生。在随机预言模型下,方案的不可伪造性和机密性被规约为多项式时间敌手求解离散对数DL(Discrete Logarithm)问题和判定DH(Decision Diffie–Hellman,DDH)问题,具有可证明安全性。对比已有方案,该方案不仅保证了安全性,而且计算开销和实现成本都较低,适用于在无线传感网络等计算、存储和通信资源受限的应用场景保障数据的机密性、完整性和认证性。 The study on several newly proposed certificateless signcryption schemes without pairing operation found that there are the correctness flaws or security flaws. Therefore,we proposed a new certificateless signcryption scheme without pairing. The new signcryption scheme changes the linear structure of two keys in current scheme,and is able to resist the public key replacement attack launched by the type I adversary; and it bonds the identities of signcryption sender and receptor with the message to be signed the encryption by adopting two hash functions to prevent internal attacks. The unforgeability and confidentiality of the new signcryption scheme could be deduced to a polynomial time adversary to resolve the discrete logarithm problem and decision Diffie Hellman problem,which were provably secure,in the random oracle model. Comparing with existing schemes,the new scheme not only ensures the security,its computational overhead and implementation costs are also lower,and is suitable for protecting data confidentiality,integrity and authentication in computing,storing and communication resources-constrained scenarios,like the wireless sensor networks.
作者 邹昌芝
出处 《计算机应用与软件》 CSCD 2016年第3期327-333,共7页 Computer Applications and Software
关键词 无证书密码学 签密 双线性对 随机预言模型 Certificateless cryptography Signcryption Bilinear pairing Random oracle model
  • 相关文献

参考文献22

  • 1AlRiyami S S,Paterson K G.Certificateless public key cryptography[C].ASIACRYPT 2003,LNCS 2894,Berlin:Springer-Verlag,2003:452-473.
  • 2Shamir A.Identity-based cryptosystems and signature schemes[C]//Proceedings of CRYPTO 1984,LNCS 196,Berlin:Springer-Verlag,1985:47-53.
  • 3Boneh D,Franklin M K.Identity-based Encryption from the Weil Pairing[C]//Proc.of CRYPTO’01.Berlin,Germany:Springer-Verlag,2001:213-229.
  • 4Chen L,Cheng Z,Smart N P.Identity-Based key agreement protocols from pairings[J].International Journal of Information Security,2007,6(4):213-241.
  • 5Schnorr C P.Efficient signature generation for smart card[J].Journal of Cryptology,1991,4(3):161-174.
  • 6Baek J,Safavi R,Susilo W.Certificateless public key encryption without pairing[C]//Proceedings of the 8th International Conference on Information Security,LNCS 3650,Berlin:Springer-Verlag,2005:134-148.
  • 7Zheng Y L.Digital signcryption or how to achieve cost(signature&encryption)<.
  • 8Barbosa M,Farshim P.Certificateless signcryption[C]//Proceedings of the ACM Symp.on Information,Computer and Communications Security(ASIACCS 2008).New York,ACM,2008:369-372.
  • 9Barreto P,Deusajute A M,Cruz E,et al.Toward efficient certificateless signcryption from(and without)bilinear pairings[EB/OL].2008.[2014-05-13].http://www.redes.unb.br/ceseg/anais/2008/data/pdf/st03_03_artigo.pdf.
  • 10朱辉,李晖,王育民.不使用双线性对的无证书签密方案[J].计算机研究与发展,2010,47(9):1587-1594. 被引量:47

二级参考文献94

  • 1Zheng Yuliang.Digital signcryption or how to achieve cost (signature and encryption) 《《 cost (signature) + cost (encryption)[G] //LNCS1294,CRYPTO'1997.Berlin:Springer,1997:165-179.
  • 2AI-Riyami S S,Paterson K G.Certificateless public key cryptography[G] //LNCS2894:Asiacrypt'03.Berlin!Springer,2003:452-473.
  • 3Shamir A.Identity-based cryptosystems and signature schemes[G] //LNCS196:CRYPTO'1984.Berlin; Springer,1984:47-53.
  • 4Aranha D,Castro R,Lopez J,et al.Efficient certificateless signcryption[EB/OL].(2008-09-05)[2009-03-21].http.//sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_01_resumo.pdf.
  • 5Wu Chenhuang,Chen Zhixiong.A new efficient certificateless signcryption scheme[C] //Proc of ISISE'08.Piscataway,NJ:IEEE,2008:661-664.
  • 6Barreto P L,Deusajute A M,Cruz E C,et al.Toward efficient certificateless signcryption from (and without)bilinear pairings[EB/OL].(2008-09-05)[2009-03-21].http://sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_03_artigo.pdf.
  • 7Sharmila D S,Vivek S S,Pandu R C.On the security of certificateless signcryption schemes[EB/OL].(2009-03-05)[2009-06-12].Http://eprint.Iacr.Org/2009/298.Pdf.
  • 8Barbosa M,Farshim P.Certificateless signcryption[C] //Proc of ASIACCS'2008.New York:ACM,2008:369-372.
  • 9Li Fagen,Masaaki S,Tsuyoshi T.Certificateless hybrid signcryption[G] //LNCS5451,Proc of ISPEC2009.Berlin,Springer,2009:112-123.
  • 10Zheng YL. Digital signcryption or how to achieve cost(signature & encryption)<<cost(signature)+cost(encryption). In: Jr Kaliski BS, ed. Proc. of the CRYPTO'97. LNCS 1294, Heidelberg: Springer-Verlag, 1997. 165-179. [doi: 10.1007/BFb0052234].

共引文献93

同被引文献26

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部