期刊文献+

一种基于身份的广义签密方案 被引量:2

An Identity-based Generalized Signcryption Scheme
下载PDF
导出
摘要 为了解决安全性需求不确定网络环境的安全性问题,广义签密方案被提出,其具有灵活多变的特点,能在一个密码模块内实现签密、加密和签名三种功能。以提高计算效率和实现更高的安全性为目标,研究分析了以往高效安全的广义签密方案,给出了一种新的基于身份广义签密方案。从各方面对该方案进行了安全性的证明与分析,并将该方案与目前计算效率较高的广义签密方案进行了比较,还给出了一个该方案的应用实例,描述了该方案在邮件系统中的具体运用过程。结果表明,新方案的椭圆曲线点乘运算、双线性对运算的次数都有所降低。 For meeting the requirements of security in unstable network environment,genaralized signcryption is proposed. It has flexible features,and can achieve signcryption,encryption and signature within one cryptographic module. In order to improve the computational efficiency and security, analysis of the proposed schemes, a new identity-based generalized signcryption program is put forward. The security of this scheme is proved from all aspects,then it is in contrast with the proposed schemes which has high computational efficiency. An application example of the scheme is given and the process of applying the program is described in mail system. The results show that the new scheme reduces the numbers of computation of the pairing and scalar multiplication.
出处 《计算机技术与发展》 2016年第10期83-86,共4页 Computer Technology and Development
基金 国家自然科学基金资助项目(61073188)
关键词 广义签密 基于身份密码体制 双线性对 签密 generalized signcryption identity-based cryptography bilinear pairing signcryption
  • 相关文献

参考文献6

二级参考文献85

  • 1祁正华,杨庚,任勋益.Provably Secure Certificateless Ring Signcryption Scheme[J].China Communications,2011,8(3):99-106. 被引量:10
  • 2韩益亮,杨晓元.ECDSA可公开验证广义签密[J].计算机学报,2006,29(11):2003-2012. 被引量:29
  • 3SHAMIR A. Identity-based cryptosystems and signature schemes [ C ]//Advances in Cryptology-CRYPTO' 84. Berlin: Springer-Verlag, 1984:47-53.
  • 4LAL S, KUSHWAH P. ID based generalized signcryption[ R/OL]. (2008-08- 04 ). http://eprint, iacr. org/.
  • 5AN J H, DODIS Y, RABIN T. On the security of joint signature and encryption[C]//Advances in Cryptology EUROCRYPT' 2002. Berlin : Springer-Verlag,2002:83-107.
  • 6PATERSON K G. ID-based signatures from pairings on elliptic curves [ J ]. Electronics Letters ,2002,38 ( 18 ) : 1025-1026.
  • 7ZHENG Y. Digital signcryption or how to achieve cost (signatare&encryption cost ( signature ) + cost ( encryption ) [ C ]//Adrances in Cryptology-CRYPTO' 97. Berlin : Springer-Verlag, 1997 : 165-179.
  • 8Krawczyk H..The order of encryption and authentication for protecting communications(or:How secure is SSL?).In:Kilian J.ed..Proceedings of Advances in Cryptoloty-CRYPTO2001.Lecture Notes in Computer Science 2139.Berlin:Springer-Verlag,2001,310~331
  • 9Zheng Y..Digital signcryption or how to achieve cost(signature &encryption)《《cost(signature)+cost(encryption).In:Kaliski B.S.ed..Proceedings of Advances in Cryptoloty-CRYPTO'97.Lecture Notes in Computer Science 1294.Berlin:Springer-Verlag,1997,165~179
  • 10Bao F.,Deng R.H..A signcryption scheme with signature directly verifiable by public key.In:Imai H.,Zheng Y.ed..Proceedings of the Public Key Cryptography'98,Lecture Notes in Computer Science 1431,Berlin:Springer-Verlag,1998,55~59

共引文献42

同被引文献28

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部