期刊文献+

无证书密文等值测试签密方案 被引量:1

Certificateless Signcryption with Equality Test
下载PDF
导出
摘要 在云计算应用中,确保消息的机密性和不可伪造性,同时判断不同密文对应明文的等价性显得至关重要。具有密文等值测试功能的签密方案可以实现此类安全目标。该文基于无证书公钥密码环境,设计了一个具有密文等值测试功能的无证书签密方案(CLSCET)。首先,提出了无证书密文等值测试签密方案的框架和安全模型,定义了两类具有不同攻击能力的敌手和3类安全目标。然后构造了具体的无证书密文等值测试签密方案,并分析了方案的正确性。最后,基于随机预言模型,证明该文方案满足选择密文攻击下的单向性(OW-CCA)、选择密文攻击下的不可区分性(IND-CCA2)和选择消息攻击下的不可伪造性(EUF-CMA)安全。与现有近似方案相比,该文方案满足IND-CCA2的机密性、EUF-CMA的不可伪造性和OW-CCA的密文单向性。 In cloud computing applications, it is very important to ensure the confidentiality and unforgeability of messages, while judging the equivalence of different ciphertexts to plaintexts. The signcryption scheme with equality test can achieve the above security goals. Based on the certificateless public key cryptography environment, a Certificateless SignCryption scheme with Equality Test(CLSCET) is designed. Firstly, the framework and security model of the certificateless signcryption with equality test scheme are proposed,moreover two types of adversaries with different attack capabilities and three types of security targets are defined. Secondly, a specific certificateless signcryption with equality test scheme is constructed, and the correctness of the scheme is analyzed. Finally, based on the random oracle model, it is proved that the scheme satisfies the security properties of One-Way against Chosen Ciphertext Attack(OW-CCA), INDistinguishability against adaptive Chosen Ciphertext Attack(IND-CCA2) and Existential UnForgeability against adaptive Chosen Message Attack(EUF-CMA). Compared with the existing approximate schemes, the scheme satisfies the confidentiality of IND-CCA2, the unforgeability of EUF-CMA and the one-way ciphertext of OW-CCA.
作者 张玉磊 白巧玲 马彦丽 闫晨阳 王彩芬 ZHANG Yulei;BAI Qiaoling;MA Yanli;YAN Chenyang;WANG Caifen(College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China;SGIT-UNI Cloud Data Technology CO.,LTD,Lanzhou 730000,China;Shenzhen University of Technology,Shenzhen 518118,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2021年第9期2534-2541,共8页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61662069) 甘肃省高等学校科研项目(2017A-003,2018A-207)。
关键词 密文等值测试 无证书公钥密码 签密 计算DIFFIE-HELLMAN问题 Ciphertext equivalence test Certificateless public key cryptography Signcryption Computational Diffie-Hellman(CDH)problem
  • 相关文献

参考文献3

二级参考文献21

  • 1Shamir A.Identity based cryptosystems and signature schemes[C]// LNCS 196: Proceedings of Crypto' 84.Berlin: Springer-Verlag, 1984:47-53.
  • 2A1-Riyami S,Paterson K.Certificateless public key cryptography[C]// LNCS 2894: Proceedings of Asiacrypt' 03.Berlin: Springer-Verlag, 2003 : 452-473.
  • 3Zheng Y.Digital signcryption or how to achieve cost(signature & eneryption) cost (signature) +cost (encryption) [C]//LNCS 1294: Proceedings of Crypto' 97.Berlin: Springer-Verlag, 1997:165-179.
  • 4Barbosa M, Farshirn ECertificateless signcryption[C]//Proceedings of ASIACCS'08.New York:ACM,2008:369-372.
  • 5Li F, Shirase M, Takagi T.Certificateless hybrid signcryption[C]// LNCS 5451: Proceedings of ISPEC' 09.Berlin: Springer-Verlag, 2009:112-123.
  • 6Zhang L, Zhang F.A new provably secure certificateless signature scheme[C]//Proceedings of ICC' 08, IEEE,2008 : 1685-1689.
  • 7Cramer R, Shoup V.Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack[J].SIAM Joumal on Computing, 2003,33 ( 1 ) : 167-226.
  • 8Barreto P,Kim H,Lynn B ,et al.Efticient algorithms for pairingbased cryptosystems[C]//LNCS 2442: Proceedings of Crypto' 02. Berlin: Springer-Verlag, 2002 : 354-368.
  • 9Barreto P, Kim H, Lynn B, et al.Efficient implementation of pairing-based cryptosystems[J].Joumal of Cryptology, 2004, 17 (4) :321-334.
  • 10Barreto P, Galbraith S, hEigeartaigh C 0, et al.Efticient pairing computation on supersingular Abelian varieties[J].Designs, Codes and Cryptography, 2007,42 (3) : 239-271.

共引文献19

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部