期刊文献+

适用于WSN的在线/离线异构签密方案 被引量:3

Online/Offline Heterogeneous Signcryption Scheme for WSN
下载PDF
导出
摘要 针对传感器节点与互联网主机通信安全性较低的问题,提出一种CLPKC-to-TPKC在线/离线异构签密方案。该方案结合在线/离线技术,定义从无证书公钥密码到传统公钥密码环境的形式化安全模型,并在随机预言模型下基于q-SDH,m ICDH和BDHI困难假设问题,证明方案的安全性。分析结果表明,与IDPKC-to-CLPKC在线/离线异构签密方案相比,该方案只需要2个双线性对运算,具有更高的运算效率,适用于无线传感器网络。 Aiming at the weak security problem of communication between the sensor nodes and the Internet hosts, a CLPKC-to-TPKC online/offline Heterogeneous Signcryption (HSC) scheme is proposed. Based on the online/offline technology, this paper defines a formalized security model from the certificateless public key cryptography to the traditional public key cryptography environment. In the random oracle model, based on q-SDH, mICDH and BDHI difficult assumption problem, the scheme is proved to satisfy the security requirement. Analysis results show that compared with the IDPKC-to-CLPKC online/offline heterogeneous signcryption scheme, the proposed scheme is more efficient for only using two bilinear pairs of operations, so it is suitable for Wireless Sensor Network(WSN).
出处 《计算机工程》 CAS CSCD 北大核心 2017年第8期161-168,共8页 Computer Engineering
基金 国家自然科学基金(61363059 61662070) 甘肃省科技支撑计划项目(1604FKCA097) 西北师范大学青年教师科研能力提升计划项目(NWNU-LKQN-13-24)
关键词 无线传感器网络 无证书公钥密码 传统公钥密码 异构签密 在线/离线签密 Wireless Sensor Network (WSN) certificateless public key cryptography traditional public keycryptography Heterogeneous Signcryption(HSC) online/offline signcryption
  • 相关文献

参考文献5

二级参考文献56

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2韩益亮,杨晓元.ECDSA可公开验证广义签密[J].计算机学报,2006,29(11):2003-2012. 被引量:29
  • 3Al-Riyami S S,Paterson K.Certificateless Public Key Cryptography[C]//Proceedings of ASIACRYPT’03.Berlin,Germany:Springer-Verlag,2003:452-473.
  • 4Huang Xinyi,Mu Yi,Willy S,et al.Certificateless Signatures:New Schemes and Security Models[J].The Computer Journal,2012,55(4):457-474.
  • 5Du Hongzhen,Wen Qiaoyan.Certificateless Proxy Multi-signature[J].Information Sciences,2014,276:21-30.
  • 6Wang Boyang,Li Baochun,Li Hui,et al.Certificateless Public Auditing for Data Integrity in the Cloud[C]//Proceedings of IEEE Conference on Communications and Netw ork Security.Washington D.C.,USA:IEEE Press,2013:136-144.
  • 7Ju Hak-Soo,Kim D Y,Lee D H,et al.Efficient Revocation of Security Capability in Certificateless Public Key Cryptography[C]//Proceedings of KES’05.Berlin,Germany:Springer-Verlag,2005:453-459.
  • 8Yap W S,Sherman S MC,Heng Swee-Huay,et al.Security Mediated Certicateless Signatures[C]//Proceedings of ACNS’07.Berlin,Germany:Springer-Verlag,2007:459-477.
  • 9Shen Limin,Zhang Futai,Sun Yinxia.Efficient Revocable Certificateless Encryption Secure in the Standard Model[J].The Computer Journal,2014,57(4):592-601.
  • 10Sun Yinxia,Zhang Futai,Shen Limin,et al.A Revocable Certificateless Signature Scheme[J].Journal of Computers,2014,9(8):1843-1850.

共引文献39

同被引文献30

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部