期刊文献+

前向安全的格上基于身份签密方案 被引量:2

Forward secure identity-based signcryption from lattice
下载PDF
导出
摘要 针对目前基于格的签密方案尚不能满足前向安全性,提出一个具有前向安全的基于身份的签密方案。首先,该方案利用格基授权算法对用户和发送者的公私钥对进行更新;其次,结合基于格上错误学习问题的原像采样算法进行用户签名,并利用包含签名信息的哈希值对消息进行加密。在随机预言机模型下,证明该方案是适应性选择身份和选择密文攻击安全(IND-s ID-CCA2)和强不可伪造选择消息攻击安全(s UF-CMA)的,同时证明了该方案具有前向安全性。相对于基于配对的签密方案,所提方案在计算速度和密文扩展率的优势都较为明显。 To solve the problem that current signcryption schemes based on lattice cannot achieve forward security, a new identity-based signcryption scheme with forward security was proposed. Firstly, lattice basis delegation algorithm was used to update the users' public keys and private keys. Then, the preimage sampleable functions based on Learning With Errors (LWE) over lattice was used to sign the message, and the signature was also used to encrypt the message. The scheme was proved to be adaptive INDistinguishiability selective IDentity and Chosen-Ciphertext Attack (IND-sID-CCA2) secure, strong UnForgeable Chosen-Message Attack (sUF-CMA) secure and forward secure. Compared with the signcryption schemes based on pairings, the proposed scheme has more advantages in computational efficiency and ciphertext extension rate.
出处 《计算机应用》 CSCD 北大核心 2016年第11期3077-3081,3087,共6页 journal of Computer Applications
基金 国家自然科学基金资助项目(61272492 61572521) 陕西省自然科学基础研究计划项目(2015JM8300) 武警工程大学基础研究项目(WJY201422 WJY201523)~~
关键词 前向安全 基于身份加密 错误学习 格基授权 选择密文攻击 forward secure identity-based encryption Learning With Errors (LWE) lattice basis delegation chosen ciphertext attack
  • 相关文献

参考文献4

二级参考文献56

  • 1张串绒,肖国镇.一个可公开验证签密方案的密码分析和改进[J].电子学报,2006,34(1):177-179. 被引量:16
  • 2黄欣沂,张福泰,伍玮.一种基于身份的环签密方案[J].电子学报,2006,34(2):263-266. 被引量:17
  • 3李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 4ZHENG Y L. Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption)[A]. Cryptology- CRYPTO'97, LNCS1294[C]. Berlin, New York, Tokyo, 1997. 165-179.
  • 5LI F G, HU Y P, ZHANG C R. An identity-based signcryption scheme for multi-domain ad hoc networks[A]. ACNS 2007, LNCS 4521[C]. 2007. 373-384.
  • 6KIM H, SONG J, YOON H. A practical approach of ID-based cryptosystem in ad hoc networks[A]. Wireless Communications and Mobile Computing[C]. 2007. 909-917.
  • 7DENG H, AGRAWAL D P. TIDS: threshold and identity-based security scheme for wireless ad hoc networks[J]. Ad Hoc Networks, 2004, 2 (3): 291-307.
  • 8LI J F, WEI D W, KOU H Z. Identity-based and threshold key management in mobile ad hoc networks[A]. International Conference on Wireless Communications, Networking and Mobile Computing 2006. (WiCOM 2006)[C]. 2006,1-4.
  • 9KAMAT P, BALIGA A, Trappe W. An identity-based security framework for VANETs[A]. VANET'06[C]. Los Angeles, California, USA. 2006.94-95.
  • 10MALONE-LEE J. Identity based signcryption[EB/OL], http://eprint. iacr.org/2002/098/.

共引文献27

同被引文献10

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部