期刊文献+

一种新型基于身份密钥隔离的签名方案

A New Identity-Based Key-Insulated Signature Scheme
下载PDF
导出
摘要 密钥隔离方案能够在一定程度上解决基于身份的密码系统中密钥分发中心权限过于集中的问题。基于支持多外围设备的身份密钥隔离签名方案和Hess签名方案,提出了一种新的基于身份密钥隔离数字签名方案;进一步针对密钥隔离、强密钥隔离和密钥更新的安全性进行了分析;最后,通过与支持多外围设备的身份密钥隔离签名方案和Hess签名方案进行效率分析与比较,该方案验算次数少、签名长度短、速度快,更适用于资源受限的智能手机中。 Key-Insulatedschemecansolvekeydistributioncenterpermissionsconcentrationproblemsbasedonidentitycryptographicsystem in a way.This paper propose a new Identity-Based Key-Insulated digital signature scheme on the basis of supporting more peripheral Identity-Based Key-Insulated signature scheme and Hess signature scheme; and Key-Insulated,strong Key-Insulated and the key update securitywere analyzed; Finally, the scheme compared efficiencywith supporting more peripheral Identity-Based Key-Insulated signature scheme and Hess signature scheme,the scheme is checking fewer,shorter length of signature,faster,more applicable in resource constrained smart phones.
作者 刘易 彭长根
出处 《网络空间安全》 2017年第1期40-45,共6页 Cyberspace Security
基金 国家自然科学基金(61662009 61262073 61363068) 贵州省教育厅青年科技人才成长项目(黔教合KY字[2016]169) 贵州省科技基金计划项目(黔科合基础[2016]1023)
关键词 密钥隔离 数字签名 密钥隔离安全性 效率分析 key-Insulated digitalsignature key-Insulatedsecurity efficiencyanalysis
  • 相关文献

参考文献5

二级参考文献49

  • 1WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:24
  • 2Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Proc. of the Crypto'84. LNCS 196, Berlin: Springer-Verlag, 1984.47-53.
  • 3Anderson R. Two remarks on public-key cryptology. Invited lecture. In: Proc. of the CCCS'97. 1997. http://www.cl.cam.ac.uk/ users/rjal4/
  • 4Bellare M, Miner S. A forward-secure digital signature scheme. In: Wiener M, ed. Proc. of the CRYPTO'99. LNCS 1666, Berlin: Springer-Verlag, 1999.431-448.
  • 5Itkis G, Reyzin L. SiBIR: Signer-base intrusion-resilient signatures. In: Yung M, ed. Proc. of the Crypto 2002. LNCS 2442, Berlin: Springer-Verlag, 2002.499-514.
  • 6Dodis Y, Katz J, Xu S, Yung M. Key-Insulated public-key cryptosystems. In: Knudsen LR, ed. Proc. of the Eurocrypt 2002. LNCS 2332, Berlin: Springer-Verlag, 2002.65-82.
  • 7Bellare M, Palacio A. Protecting against key exposure: Strongly key-insulated encryption with optimal threshold. 2002. http://eprint. iacr.org/2002/064
  • 8Hanaoka Y, Hanaoka G, Shikata J, Imai H. Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. In: Deng R, Qing S, Bao F, Zhou J, eds. Proc. of the ICICS 2002. LNCS 2513, Berlin: Springer-Verlag, 2002.85-96.
  • 9Dodis Y, Yung M. Exposure-Resilience for free: The hierarchical ID-based encryption case. In: Proc. of the IEEE SISW 2002. 2002.45-52.
  • 10Cheon JH, Hopper N, Kim Y, Osipkov I. Authenticated key-insulated public key encryption and timed release cryptography. 2004. http://eprint.iacr.org/2004/231

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部