期刊文献+

身份基在线离线签密方案的分析

An alysis of Identity-Based Online Offline Signcryption Scheme
下载PDF
导出
摘要 本文对一个适用于物联网的身份基在线/离线签密方案进行了密码学分析。使用接收者的内部攻击方法对原方案进行伪造性攻击。该攻击表明一个合法的接收者可以与某个第三方合谋来伪造签密文。使用发送者的内部攻击方法对原方案进行保密性攻击。该攻击表明一个合法的发送者可以与某个第三方合谋来破坏方案的保密性。两种攻击表明,原方案是不安全的,不能应用于物联网环境的安全通信。 This paper analyses the security of an identity based online/offline signcryption scheme for secure communication in Internet of things.A forgery attack is made on the scheme by using the method of inside attacks of receiver.It shows that a valid receiver can collude with any third party to forge a signcryption.A confidential attack is made on the scheme by using the method of inside attacks of sender.It shows that a valid sender can collude with any third party to breach the confidentiality of the scheme.These two attacks show that the original scheme is insecure to be applied in Internet of things.
作者 温博海 周才学 WEN Bohai;ZHOU Caixue(School of Compute and Big Data Science,Jiujiang University,Jiujiang,China,332005)
出处 《福建电脑》 2021年第11期36-38,共3页 Journal of Fujian Computer
基金 江西省教育厅科技项目(No.GJJ201807)资助。
关键词 在线离线签密 身份基 物联网 双线性对 Online Offine Signcryption Identity-Based Cryptography Internet of Things Bilinear Maps
  • 相关文献

参考文献1

二级参考文献45

  • 1Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption). Cost (signature)+ cost (encryption) [C]Advances in Cryptology-CRYPTO' 97, LNCS 1294, Springer-Verlag, 1997. 165-179.
  • 2H. Petersen, M. Michels. Cryptanalysis and improvement of signcryption schemes[J]. IEE Proceedings-Computers and Digital Techniques, 1998, vol. 145, no. 2:149-151.
  • 3F. Bao, R.H. Deng. A signcryption scheme with signature directly verifiable by public key[C]In Proc. Public Key Cryptography-PKC' 98, LNCS 1431, Springer-Verlag, 1998.55-59.
  • 4D.H. Yum, P.J. Lee. New signcryption schemes based on KCDSA[C]lnformation Security and Cryptology-ICISC2001, LNCS 2288, Springer Verlag, 2002. 305-317.
  • 5J.B. Shin, K. Lee, and K. Shim. New DSA-verifiable signcryption schemes[C].Information Security and Cryptology-ICISC 2002, LNCS 2587, Springer-Verlag, 2003.35-47.
  • 6H.Y. Jung, D.H. Lee, J.l. Lim, and K.S. Chang, Signcryption schemes with forward secrecy[C]. Information Security Application-WISA 2001, Seoul, Korea, 2001. 463-475.
  • 7R. Steinfeld, Y. Zheng. A signcryption scheme based on integer factorization[C]lnformation Security Workshop-ISW 2000, LNCS 1975, Springer-Verlag, 2000. 308-322.
  • 8J. Malone-Lee and W. Mao, Two birds one stone: signcryption using RSA[CITopics in Cryptology-CT-P, SA 2003, LNCS 2612, Springer Verlag, 2003.211-226.
  • 9Y. Zheng, H. Imai. How to construct efficient signcryption schemes on elliptic curves[J]. Information Processing Letters, 1998, vol. 68, no. 5:227-233.
  • 10J. Baek, P-. Steinfeld, and Y. Zheng. Formal proofs for the security of signcryption[J]. Journal of Cryptology, 2007, vol. 20, no 2, 203-235.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部