期刊文献+

适用于电子认证的高效无证书混合签密方案 被引量:1

An Efficient Certicateless Hybrid Signcryption Scheme for Electronic Authentication
下载PDF
导出
摘要 无证书混合签密解决了证书管理问题、密钥托管问题,具有能够处理任意长度消息等多重优势,适用于电子认证领域.对Sun提出的高效签密方案进行了分析,发现其不满足不可抵赖性和可公开验证性.提出了一个改进的无证书混合签密方案,新方案满足不可抵赖性、公开验证性以及前向安全性,同时保持了原方案的高效性.在随机预言模型中,基于双线性Diffie-Hellman问题和计算Diffie-Hellman问题对新方案进行了证明. Certificateless hybrid signcryption can solve the problem of the management of CA in public key encryption system and key trustee in the IBE encryption system. It also can handle messages of arbitrary length, which is applicable to electronic authentication. Analysis of the scheme proposed by Sun shows that the scheme can't resist dishonest recipient's forgery attack and can't achieve public verification. This paper proposed an improved signcryption scheme to overcome these security problems, which satisfies undeniable, verifiability and forward security, and keeps its high efficiency. The improved scheme was proven to be secure under BDH assumption and CDH assumption in the random oracle model.
作者 张宇 侯健 Zhang Yu;Hou Jian(Beijing Certificate Authority Co.,Ltd,Beijing 100190;Army Aviation Research Institute,Beijing 101121)
出处 《信息安全研究》 2019年第10期879-886,共8页 Journal of Information Security Research
关键词 无证书混合签密 不可抵赖性 公开验证性 双线性对 随机预言模型 电子认证 certificateless hybrid signcryption undeniable verifiability pairing random oracle model electronic authentication
  • 相关文献

参考文献3

二级参考文献44

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2L C Guillou,J J Quisquater.A "paradoxical" identity-based signature scheme resulting from zero-knowledge[G].In:Advances in Cryptology-Crypto'88,LNCS 403.Berlin:Springer-Verlag,1990.216-231
  • 3U Fiege,A Fiat,A Shamir.Zero-knowledge proofs of identity[J].Journal of Cryptology,1998,1(2):77-94
  • 4C Cocks.An identity based encryption scheme based on quadratic residues[G].In:Proc of the IMA Int'l Conf on Cryptography and Coding,LNCS 2260.Berlin:Springer-Verlag,2001.360-363
  • 5D Boneh,M Franklin.Identity-based encryption from the Weil pairing[G].In:Advances in Cryptology-Crypto'01,LNCS 2139.Berlin:Springer-Verlag,2001.213-229
  • 6B Lynn.Authenticated ID-based encryption[R].Cryptology ePrint Archive,Tech Rep:2002/072,2004.http://eprint.iacr.org/ 2002/072
  • 7R Canetti,S Halevi,J Katz.Chosen-ciphertext security from identity based encryption[G].In:Advances in Cryptology-Eurocrypt'04,LNCS 3027.Berlin:Springer-Verlag,2004.207-222
  • 8D Boneh,X Boyen.Efficient selective ID secure identity based encryption without random Oracles[G].In:Advances in Cryptology-Eurocrypt'04,LNCS 3027.Berlin:Springer-Verlag,2004.223-238
  • 9D Boneh,X Boyen.Secure identity based encryption without random oracles[G].In:Advances in Cryptology-Crypto'04,LNCS 3152.Berlin:Springer-Verlag,2004.443-459
  • 10B Waters.Efficient identity-based encryption without random Oracles[G].In:Advances in Cryptology-Eurocrypt'05,LNCS 3494.Berlin:Springer-Verlag,2005.114-127

共引文献31

同被引文献17

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部