期刊文献+

高效的TPKC→IDPKC的异构签密方案 被引量:3

Efficient TPKC→IDPKC heterogeneous signcryption scheme
下载PDF
导出
摘要 机密性和不可伪造性是安全通信的两个主要目标。为了解决异构密码系统之间安全通信问题,提出了一个高效从基于传统公钥密码体制到基于身份的公钥密码体制异构签密方案(TPKC→IDPKC)。该方法运行签密算法时,不需要对运算;运行解签密算法时,只需要两个对运算,与已有同类方案相比较,效率有了较大的提高;同时在随机预言模型下,基于CDH(Computable Diffie-Hellman)问题,证明该方案满足IND-SC-CCA2安全性和EUF-SC-CMA安全性。 Confidentiality and unforgeability are two main goals of secure communication. In order to solve the problem between two heterogeneous cryptographic systems, this paper proposes an efficient Traditional Public Key Cryptography(TPKC)to Identity based Public Key Cryptography(IDPKC)heterogeneous signcryption scheme. In the signcryption algorithm of this scheme, it does not need pairing operation, in the un-signcryption algorithm, it only needs two pairing operations, efficiency has been greatly improved. Therefore, its efficiency is higher than the existing one. In the random oracle model, based on the Computable Diffie-Hellman(CDH)hard problem, it proves that the scheme has IND-SC-CCA2 security and EUF-SC-CMA security.
出处 《计算机工程与应用》 CSCD 北大核心 2018年第2期125-130,154,共7页 Computer Engineering and Applications
基金 甘肃省高等学校科研基金(No.2013A-014) 国家自然科学基金(No.61262057 No.61163038 No.61262056)
关键词 异构系统 传统公钥密码体制 基于身份公钥密码体制 机密性 不可伪造性 heterogeneous systems Traditional Public Key Cryptography(TPKC) Identity based Public Key Crypto graphy(IDPKC) confidentiality unforgeability
  • 相关文献

参考文献2

二级参考文献13

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2Al-Riyami S S,Paterson K.Certificateless Public Key Cryptography[C]//Proceedings of ASIACRYPT’03.Berlin,Germany:Springer-Verlag,2003:452-473.
  • 3Huang Xinyi,Mu Yi,Willy S,et al.Certificateless Signatures:New Schemes and Security Models[J].The Computer Journal,2012,55(4):457-474.
  • 4Du Hongzhen,Wen Qiaoyan.Certificateless Proxy Multi-signature[J].Information Sciences,2014,276:21-30.
  • 5Wang Boyang,Li Baochun,Li Hui,et al.Certificateless Public Auditing for Data Integrity in the Cloud[C]//Proceedings of IEEE Conference on Communications and Netw ork Security.Washington D.C.,USA:IEEE Press,2013:136-144.
  • 6Ju Hak-Soo,Kim D Y,Lee D H,et al.Efficient Revocation of Security Capability in Certificateless Public Key Cryptography[C]//Proceedings of KES’05.Berlin,Germany:Springer-Verlag,2005:453-459.
  • 7Yap W S,Sherman S MC,Heng Swee-Huay,et al.Security Mediated Certicateless Signatures[C]//Proceedings of ACNS’07.Berlin,Germany:Springer-Verlag,2007:459-477.
  • 8Shen Limin,Zhang Futai,Sun Yinxia.Efficient Revocable Certificateless Encryption Secure in the Standard Model[J].The Computer Journal,2014,57(4):592-601.
  • 9Sun Yinxia,Zhang Futai,Shen Limin,et al.A Revocable Certificateless Signature Scheme[J].Journal of Computers,2014,9(8):1843-1850.
  • 10张福泰,孙银霞,张磊,耿曼曼,李素娟.无证书公钥密码体制研究[J].软件学报,2011,22(6):1316-1332. 被引量:52

共引文献31

同被引文献21

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部