期刊文献+

具有隐私保护特性的证书否认认证加密方案

A Certificate Denial Authentication Encryption Schemes with Privacy Protection Features
下载PDF
导出
摘要 网络信息的快速发展,使得身份信息的安全性变得更为重要。文章基于证书公钥密码体制,提出了一种具有隐私保护特性的证书否认认证加密方案,有效避免了投票者身份在电子投票过程中和发送邮件者在发送邮件过程中存在的安全性问题。文章在随机预言模型下基于数学困难问题证明该方案具有不可区分性和不可伪造性。同时,该方案满足否认性的特点,不仅保护了投票者和发送者身份隐私,并对投票消息和发送消息进行否认以更好地解决隐私问题。与现有的身份否认认证加密方案相比,该方案的加密和验证效率相当,但消除了密钥托管问题。 In the rapid development of network information, the security of identity information has become particularly important and critical. Based on the certificate public key cryptosystem, this paper proposes a denial-authentication encryption scheme for certificates with privacy protection features, which effectively avoids the security problems of the voter identity in the electronic voting process and the sender's sending email. Under the random oracle model(ROM), based on the bilinear Diffie-Hellman(BDH) assumption and Computational Diffie-Hellman(CDH) assumption, the scheme is proved to satify the indistinguishability and the existential unforgeability.Meanwhile, the scheme satisfies the denial, not only protects the privacy of voters and senders, but also denies voting messages and sending messages to better solve privacy problems. Compared with the existing identity- based denied authentication encryption schemes, the efficiency of the scheme is equivalent to the above ones in the aspects of encryption and verification, however the key escrow problems of those schemes are eliminated.
作者 张玉磊 马彦丽 刘文静 王彩芬 ZHANG Yulei;MA Yanli;LIU Wenjing;WANG Caifen(College of Computer Science and Engineering,Northwest Normal University,Lanzhou Gansu 730070,China)
出处 《信息网络安全》 CSCD 北大核心 2018年第10期62-69,共8页 Netinfo Security
基金 国家自然科学基金[61163038 61262056 61262057] 甘肃省高等学校科研项目[2017A-003 2018A-207] 西北师范大学青年教师科研能力提升计划[NWNU-LKQN-14-7]
关键词 否认认证加密 证书公钥加密 随机预言模型 电子投票 deniable authenticated encryption certificate-based public key encryption random oracle model electronic voting
  • 相关文献

参考文献3

二级参考文献25

  • 1石艳荣,贺永强.PKI和基于身份加密的比较[J].微计算机信息,2008,24(3):83-84. 被引量:8
  • 2刘宏伟,谢维信,喻建平.一种基于身份的无可信第三方签名方案[J].深圳大学学报(理工版),2007,24(3):257-260. 被引量:2
  • 3Shamir A.Identity-based Cryptosystems and Signature Schemes[C],LNCS196:Advances in Cryptology:Crypto' 84.Berlin:Springer,1984,47-53.
  • 4Boneh D,Franklin M.Identity based encryption from the Weil Paring[C].LNCS2139:Adnances in Cryptology:Crypto' 2001.Berlin:Springer,2001,213-229.
  • 5Boneh D,Lynn B,Shacham H.Short Signature from the Weft Paring[C].LNCS 2248:Advances in Cryptology,ASIAAP,YPT' 2001.Berlin:Springer,2001,516-532.
  • 6Diffe.W,Hellman.M.E.New Directions in Cryptology[J].IEEE Transaction on Information Theory,1976,22(6):644-654.
  • 7Hess F.Efficient Identity Based Signature Schemes Based on Parings[C].LNCS2595:Selected Area in Cryptography,SAC' 02.Berlin:Springer,2003,310-324.
  • 8Boneh D,Gentry C,Lynn B,Shacham H.Aggregate and Verifiably Encrypted Signatures from Bilinear Maps[C].LNCS2656:Advances in Cryptology-Proceeding,Eurocrypt'03.Berlin:Sptinger,2003,416-432.
  • 9李庆德.椭圆曲线密码体制的研究与实现[D].西安:西安电子科技大学,2008.
  • 10Schaudin.com. Machine Translation Add-On for RC-WinTrans [EB/ OL]. http://rc-wintrans.s,.chaudin.com/addons/MT/,February 07, 2012/ June 07,2012.

共引文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部