期刊文献+

标准模型下可证明安全的无证书广义签密 被引量:5

Certificateless generalized signcryption scheme in the standard model
下载PDF
导出
摘要 Liu等在2010年提出了一种在标准模型下可证明安全的无证书签密算法(简称LHZ算法),但后续的研究成果显示LHZ算法实际上是不安全的。为了克服LHZ算法的不足,首先改进LHZ签密算法,然后以此为基本的签密算法提出一种新的无证书广义签密算法。同时给出了抵抗有预谋的KGC被动攻击(malicious-butpassive KGC attack)的无证书广义签密算法的安全性模型,并在标准模型下证明了该算法在判定性双线性Diffie-Hellman困难问题和计算性Diffie-Hellman困难问题假设下是安全的。此外,数值实验结果表明所提方案是有效的。 In 2010, Liu, et al. proposed a certificateless signcryption scheme in the standard model, but many analyses revealed that Liu's scheme was insecure in fact. To overcome the disadvantages, the scheme was improved and a certificateless generalized signcryption scheme was constructed. In addition, a formal security model for the proposed scheme against the malicious-but-passive KGC attacks was introduced. Furthermore, the proposed scheme was proven to be secure under the decisional bilinear Diffie-Hellman and the computational Diffie-Hellman intractability assumptions in the standard model. Numerical results illustrate that the proposed algorithm is efficient.
作者 牛淑芬 牛灵 王彩芬 李亚红 NIU Shu-fen NIU Ling WANG Cai-fen LI Ya-hong(College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, Chin)
出处 《通信学报》 EI CSCD 北大核心 2017年第4期35-45,共11页 Journal on Communications
基金 国家自然科学基金资助项目(No.61562077 No.61462077 No.61662071)~~
关键词 无证书密码体制 广义签密 标准模型 有预谋的KGC被动攻击 certificateless cryptography generalized signcryption standard model malicious-but-passive KGC attacks
  • 相关文献

参考文献4

二级参考文献46

  • 1韩益亮,杨晓元.ECDSA可公开验证广义签密[J].计算机学报,2006,29(11):2003-2012. 被引量:29
  • 2Riyami A l, Paterson K. Certificateless Public Key Cryptography[C]//Proc. of ASIACRYPT’03. Berlin, Germany: Springer- Verlag, 2003: 452-473.
  • 3Zheng Yuliang. Digital Signcryption or How to Achieve Cost (Signature&Encryption)<<Cost(Signature)+Cost(Encryption) [C]// Proc. of the 17th Annual International Cryptology Conference. Santa Barbara, California, USA: Springer-Verlag, 1997: 165-179.
  • 4Han Yiliang. Generalization of Signcryption for Resources- constrained Environments[J]. Wireless Communication and Mobile Computing, 2007, 7(7): 919-931.
  • 5Chen Liquan. Identity-based Signcryption[EB/OL]. (2002-09-08). http://eprint.iacr.org/2002/098.
  • 6Barbosa M, Farshim P. Certificateless Signcryption[C]//Proc. of Computer and Communications Security Conference. Berlin, Germany: Springer-Verlag, 2008.
  • 7Yap W S, Heng S H, Goi B M. An Efficient Certificateless Signature Scheme[C]//Proc. of EUC’06. Berlin, Germany: Springer-Verlag, 2006: 322-331.
  • 8Chow S S M, Yiu Siu-Ming. Efficient Forward and Provably Secure ID-based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity[C]//Proc. of the 6th Annual International Conference on Information Security and Cryptology. Berlin, Germany: Springer-Verlag, 2003: 352-369.
  • 9A1-Riyami S, Paterson K. Certificateless public-key cryptography [ C ]//Proc of ASIACRYPT 2003. 2003:452 - 473.
  • 10Shamir. Identity-based cryptosystems and signature schemes [ C ]//Proc of Crypto' 84. 1984:47 - 53.

共引文献70

同被引文献29

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部