期刊文献+

基于属性的广义签密方案

Attribute-based Generalized Signcryption Scheme
下载PDF
导出
摘要 现有签密方案不能向模糊身份的接收方发送数据、且对数据的共享访问控制不够精细,而基于属性的签密也无法自适应地实现机密性、认证性以及机密且认证等不同的安全需求.在离散对数和随机预言机模型下提出了一种基于属性的广义签密方案.通过引入属性集,使数据可以凭用户的属性为依据进行分发;通过区分通信双方所持有的密钥,可以提供单独的机密性、认证性和复合的机密性和认证性功能.在DBDH假设下的安全性分析表明方案在选择密文攻击下达到了不可区分性,在CDH假设下的安全性分析表明方案在选择消息攻击下达到了不可伪造性.与其他类似方案相比,该方案在用户的属性个数增加时,密文长度和密钥长度不会线性增长,效率更高. The existed signcryption schemes has the shortages of failing to send the data to the recipients with fuzzy identities and failing to deal with the precise access control.By employing the attribute set,the data could be distributed according to the user's attribute.By identify the users'key,it could provide the separate or combined confidentiality and authenticity adaptively.It shows that the scheme is undistinguished under chosen cipher text attack and decisional bilinear DiffieHellman(DBDH)assumption,and it is unforgeable under chosen message attack and computional Diffie-Hellman(CDH)assumption.Compared with similar schemes,the length of the cipher text and key are not increased linearly when the attributes are increasing.
出处 《计算机研究与发展》 EI CSCD 北大核心 2014年第S2期166-171,共6页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61103231 61272492) 中国博士后科学基金资助项目(2014M562445)
关键词 签密 广义签密 标准模型 公开验证 可证明安全 signcryption generalized signcryption standard model public verification provably secure
  • 相关文献

参考文献13

二级参考文献68

  • 1韩益亮,杨晓元.ECDSA可公开验证广义签密[J].计算机学报,2006,29(11):2003-2012. 被引量:29
  • 2Shamir A. Identity-based cryptosystems and signature schemes[ C]//Advances in Cryptology-CRYPTO 1984. 1984: 47-53.
  • 3Sahai A, Waters B. Fuzzy identity-based encryption[ C]//Advances in Cryptology EUROCRYPT 2005. 2005: 457-473.
  • 4Pirretti M, Traynor P, McDaniel P, et al. Secure attribute-based systems[ C]//Proceedings of the 13th ACM conference on Computer and communications security. 2006:99-112.
  • 5Bethencourt J, Sahai A, Waters B. Ciphertext-Policy Attribute-Based Encryption[ C ]//IEEE Symposium on Security and Pri- vacy. 2007- 321-334.
  • 6Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures[ C ]//Proceedings of the 14th ACM conference on Computer and communications security. 2007: 195-203.
  • 7Herranz J, Laguillaumie F, Rafols C. Constant Size Ciphertexts in Threshold Attribute-Based Encryption[ C ]//PKC 2010. 2010 : 19-34.
  • 8Khader D. Attribute based group signature with revocation[ EB/OL]. [2011-01-20 ]. http ://eprint. iacr. org/2007/159.
  • 9Guo S Q, Zeng Y P Attribute-based signature scheme[ C]//International Conference on Information Security and Assurance. 2008 : 509-511.
  • 10Maji H K, Prabhakaran M, Rosulek M. Attribute-Based Signature[ EB/OL]. [2011-12-07 ]. http://eprint, iacr. org/2010/ 595.

共引文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部