期刊文献+

可实现隐私保护的多接收者异构聚合签密方案 被引量:5

Privacy-preserving multi-recipient aggregate signcryption for heterogeneous cryptography systems
下载PDF
导出
摘要 考虑到异构密码系统中的安全通信与隐私保护,提出了一个无证书密码系统到基于身份密码系统的异构签密方案,允许多个发送者与多个接收者进行安全通信并为系统中的发送者实现了匿名,只有信任机构可追踪发送者的真实信息。对于接收者,通过应用拉格朗日插值公式防止了向未授权用户泄露合法接收者的用户信息。在随机预言模型下证明了本方案满足适应性选择密文攻击以及适应性选择消息攻击下的不可区分性和存在性不可伪造。实验结果表明,本方案有效地提高了系统的计算效率。 Taking into account the secure communication and privacy protection in heterogeneous cryptography systems, we propose a heterogeneous aggregate signcryption scheme from certificateless cryptosystems to identity based cryptography systems, which allows multiple senders to communicate securely with multiple recipients. The scheme makes the senders anonymous in the system, and only trust agencies can track the senders' real information. For the receivers, the disclosure of the legitimate recipients' user information to unauthorized users is prevented by applying the Lagrange interpolation formula. In the random oracle model, it is proved that the scheme possesses indistinguishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen message attacks. Experimental results show that the scheme effectively improves the computational efficiency of the system.
作者 牛淑芬 牛灵 王彩芬 杨喜艳 贾向东 NIU Shu-fen;NIU Ling;WANG Cai-fen;YANG Xi-yan;JIA Xiang-dong(College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China)
出处 《计算机工程与科学》 CSCD 北大核心 2018年第5期805-812,共8页 Computer Engineering & Science
基金 国家自然科学基金(61562077 61462077 61662071 61662069) 西北师范大学青年教师科研能力提升计划(NWNULKQN-14-7) 国家留学基金(201708625061)
关键词 异构密码系统 聚合签密 无证书密码系统 基于身份的密码系统 heterogeneous cryptography systems aggregate signcryption certificateless cryptogra phy identity based cryptography
  • 相关文献

参考文献7

二级参考文献50

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2ZHENG Y. Digital signcryption or how to achieve cost (signature & encryption)[A]. CRYPTO 1997[C]. Springer-Verlag, 1977. 165-179.
  • 3MALONE-LEE J. Identity based signcryption [EB/OL]. http://eprint. iacr.org/2002/098.pdf, 2002.
  • 4BELLARE M, BOLDYREVA A, MICALI S. Public-key encryption in a multi-user setting: security proofs and improvements[A]. EUROCRYPT 2000[C]. Springer-Verlag, 2000. 259-274.
  • 5BAUDRON O, POINTCHEVAL D, STERN J. Extended notions of security for multieast public key cryptosystems[A]. ICALP 2000[C].Springer-Verlag, 2000.499-511.
  • 6DUAN S, CAO Z. Efficient and provably secure multi receiver identity based signcryption[A]. ACISP 2006[C]. Springer-Verlag, 2006. 95-206.
  • 7SHARMILA S, SREE S, SRINIVASAN R, et al. An efficient identity-based signcryption scheme for multiple receivers[A]. IWSEC 2009[C]. Springer-Verlag, 2009. 71-88.
  • 8ELKAMCHOUCHI H, ABOUELSEOUD Y. MIDSCYK: an efficient provably secure multirecipient identity-based signcryption scheme [A]. ICNM 2009, Networking and Media Convergence[C]. 2009.70-75.
  • 9CHEN L, MALONE-LEE J. Improved identity-based signcryption [A]. PKC 2005[C]. Springer-Verlag, 2005. 362-379.
  • 10YU Y, YANG B, HUANG X. Efficient identity-based signcryption scheme for multiple receivers[A]. ATC 2007[C]. Springer-Verlag, 2007. 13-21.

共引文献46

同被引文献45

引证文献5

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部