期刊文献+

异构双向签密方案的安全性分析和改进 被引量:9

Security Analysis and Improvement of Mutual Signcryption Schemes under Heterogeneous Systems
下载PDF
导出
摘要 异构签密可以保证异构密码系统之间数据的机密性和不可伪造性。2016年,刘景伟等人提出了传统公钥密码和无证书公钥密码之间的PCHS和CPHS双向异构签密方案。但是,经过分析,发现PCHS方案和CPHS方案均不安全。首先描述了第2类敌手对两个方案的攻击过程,其次分析了两个方案存在第2类敌手攻击的原因,最后对PCHS方案和CPHS方案进行改进。改进方案克服了原方案的安全性问题,保证了传统公钥密码和无证书公钥密码环境之间数据的安全传输。 Heterogeneous signcryption can be used to guarantee the confidentiality and unforgeability in the different cryptography. In 2016, between traditional public key cryptography and certificateless public key cryptography, the mutual signcryption schemes including PCHS and CPHS were proposed by Liu et al. However, via the security analysis, it is shown that the above schemes are not secure. Firstly, the processes of attack performed by the second type of adversary are described. Secondly, the possible reasons why the second type of adversary can perform these attacks are analyzed. In the end, the original schemes are improved. The improved schemes can overcome the security weakness of the original schemes, and can also ensure the security of data transmission between traditional public key cryptographic and certificateless public key cryptography.
出处 《电子与信息学报》 EI CSCD 北大核心 2017年第12期3045-3050,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61163038 61262056) 甘肃省高等学校科研项目(2015B-220 2013A-014) 西北师范大学青年教师科研能力提升计划(NWNU-LKQN-14-7)~~
关键词 签密 异构系统 KGC攻击 选择密文攻击 选择消息攻击 Signcryption Heterogeneous system KGC's attack Chosen cipertext attack Chosen message attack
  • 相关文献

参考文献3

二级参考文献21

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2Zheng Y L. Digital signcryption or how to achieve cost ( signature & encryption) cost (signature) + cost ( en- cryption) [ A ]. Advances in the Cryptology-CRYPTO [C ]. California: Springer, 1997. 165 - 179.
  • 3Huang Q, Wong D S, Yang G M. Heterogeneous signcryp- tion with key privacy [J ]. The Computer Journal, 2011,54 (4) :525 -536.
  • 4Fu X T, Li X W, Liu W. IDPKC-to-TPKI construction of multi-receiver signcryption [ A]. Proceedings of the INCoS (5) [ C]. Xian :IEEE,2013. 335 -339.
  • 5Li F G, Zhang H, Takagi T. Efficient signcryption for heter- ogeneous systems[ J ]. IEEE Systems Journal, 2013,7 ( 3 ) : 420 - 429.
  • 6Shamir A. Identity-based cryptosystems and signature schemes [A ]. Advances in Cryptology [ C ]. Heidelberg: Springer, 1985.47 - 53.
  • 7Libert B, Quisquater J. Efficient signcryption with key pri- vacy from gap Diffie-Hellman groups E A 1. Advances in Public Key Cryptography-PKC [ C ]. Berlin, Springer, 2004. 187 - 200.
  • 8Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing [ A ]. Advances in Cryptology-Asiacrypt [ C ]. Berlin: Springer, 2001.514 - 532.
  • 9Yang G M,Wong D S, Deng X T. Analysis and improve- ment of a signcryption scheme with key privacy [ A ]. Ad- vances in Public Key Cryptography-PKC [ C ]. Berlin,Springer ,2005,218 - 232.
  • 10Li C K, Yang G M, Wong D S, et al. An efficient sign- cryption scheme with key privacy and its extension to ring signcryption[ J ]. Journal of Computer Security, 2010, 18 (3) .451 -473.

共引文献33

同被引文献43

引证文献9

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部