期刊文献+

结合在线/离线方法的无证书签密 被引量:1

Certificateless signcryption with online /offline technique
下载PDF
导出
摘要 作为密码学原语,签密同时具有签名的认证性与加密的机密性。在线/离线签密结合了在线/离线的方法,在已有基础上提高了系统的效率。但目前的在线/离线签密方案大多数都是在基于身份的环境下实现的,都存在密钥托管的安全问题。基于无证书密码体制撤销证书管理及无密钥托管问题的优点,提出了一种安全的在线/离线的无证书签密方案,满足离线阶段不需要确定接收者身份信息的条件,并在随机预言模型中证明了方案的安全性。 Signcryption as a cryptographic primitive is a splendid combination of signature with authentication and encryption with confidentiality simultaneously. Online /offline signcryption, with the online /offline technique, provides higher efficiency for the system. However, most of the present signcryption schemes are implemented in the identity-based setting in which there exists key escrow problem. Based on the certificateless cryptography system's advantages with revocation of certificate management and without key escrow problem, a secure online /offline certificateless signcryption scheme was proposed. The proposed scheme satisfied the requirement that there is no need to determine the recipient's information in the offline stage. Moreover, its security was proved in the Random Oracle Model( ROM).
出处 《计算机应用》 CSCD 北大核心 2014年第9期2659-2663,共5页 journal of Computer Applications
关键词 无证书签密 基于身份密码学 认证性 机密性 在线/离线 随机预言模型 certificateless signcryption identity-based cryptography authentication confidentiality online /offline Random Oracle Model(ROM)
  • 相关文献

参考文献1

二级参考文献10

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2Zheng Y. Digital signcryption or how to achieve cost (signature encryption) (cost (signature) + cost (encryption)) [C]//Proceedings of the Cryptology-CRYPTO'97. Santa Barbara, California, USA, 1997:165-179.
  • 3Shamir A. Identity-based cryptosystems and signature schemes[C]//Proceedings of the Cryptology - CRYPTO'84. Santa Barbara, California, USA, 1984: 47-53.
  • 4Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[C]// Proceedings of the ASIACRYPT 2003. Taipei, Taiwan, 2003 : 452-473.
  • 5Barbosa M, Farshim P. Certificateless Signcryption [EB/OL]. http://eprint, iacr. org/2008/143, pdf, 2008.
  • 6Wu Chen-huang, Chen Zhi-xiong. A New Efficient Certificateless Signeryptlon Scheme[C]//Proceedings of the ISISE' 08, Shanghai, China, 2008 : 661-664.
  • 7Selvi S S D, Vivek S S, Shukla D, et al. Efficient and Provably Secure Certificateless Multi-receiver Signcryption [C]//Proceedings of the ProvSec 2008. Shanghai, China, 2008 : 52-67.
  • 8Even S, Goldreich O, Macali S. On-line/off-line digital signatures[J]. Journal of Cryptology, 1996,9:35-67.
  • 9Zhang F, Mu Y, Susilo W. Reducing security overhead for mobile networks [C]//Proceedings of the 19th International Conference on Advanced Information Networking and Applications. Taipei, Taiwan, 2005 : 398-403.
  • 10Sun Dong-dong, Huang Xin-yi, Mu Yi, et al. Identity-Based Online/Off-line Signcryption [C]// Proceedings of the IFIP International Conference on Network and Parallel Computing. Shanghai, China, 2008:34-41.

共引文献1

同被引文献16

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [ C]//Proceedings of CRYPTO '84 on Advances in Cryptology. Ber- lin: Springer, 1984:47-53.
  • 2BONEH D, FRANKLIN M. Identity-based encryption from the Well pairing [ J]. SIAM Journal of Computing, 2001,32(3) : 586 -615.
  • 3WARTERS B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions [ M]// HALEVI S. Advances in Cryptology-CRYPTO 2009, LNCS 5677. Berlin: Springer, 2009:619 - 636.
  • 4HORWrFZ J, LYNN B. Toward hierarchical identity-based encryption [ EB/OL]. [ 2015- 02- 04]. http://citcsecrx, ist. psu. edu/viewdoe/ download?doi = 10.1.1. 414. 2568&rep = repl&type = pelf.
  • 5BONEH D, BOYEN X, GOH E-J. Hierarchical identity based en- cryption with constant size ciphertext [ M]//CRAMER R. Advances in Cryptology-EUROCRYPT2005, LNCS 3494. Berlin: Springer, 2005: 440 - 456.
  • 6GENTRY C, HALEVI S. Hierarchical identity based eneryption with polynomially many levels [ M ]// REINGOLD O. Theory of Cryptography, LNCS 5444. Berlin: Springer, 2009:437-456.
  • 7LEWKO A, WARTERS B. New techniques for dual system encryp- tion: and fully secure HIBE with short eiphertexts [ M]// MIC- CIANCIO D. Theory of Cryptography, LNCS 5978. Berlin: Spring- er, 2010:455 -479.
  • 8EVEN S, GOLDREICH O, MICALI S. Online/off-line digital sig- natures [ C] //Proceedings on Advances in Cryptology. New York: Springer, 1989:263 -275.
  • 9GUO F, MU Y, CHEN Z. Identity-based online/offline encryption [ M l// TSUDIK G. Financial Cryptography and Data Security, LNCS5143. Berlin: Springer, 2008:247-261.
  • 10CHOW S S M, L|U J K, ZHOU J. Identity-based online/offline key encapsulation and encryption [ EB/OL]. [ 2015- 01- 11 ]. ht- tp://eprint, iacr. org/2010/194, pdf.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部