期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Some Remarks on Cocks'Identity-Based Encryption Scheme
1
作者 ZHAO Xiaopeng 《Journal of Donghua University(English Edition)》 CAS 2024年第4期447-450,共4页
The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However... The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme. 展开更多
关键词 identity-based encryption(ibE) quadratic residue SECURITY Cocks’ibE scheme
下载PDF
Identity-based Verifiably Committed Signature Scheme without Random Oracles
2
作者 孙迅 李建华 陈恭亮 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期110-115,共6页
An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, b... An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model. 展开更多
关键词 bilinear pairings identity-based verifiably committed signature scheme standard model
下载PDF
基于无可信第三方IBS的XML数字签名 被引量:2
3
作者 叶晓彤 彭 简清明 《计算机应用》 CSCD 北大核心 2009年第5期1297-1300,共4页
传统XML数字签名基于公共密钥基础设施(PKI)体系和非对称算法,存在管理复杂、计算量大等缺陷。通过对XML数字签名规范和无可信第三方基于身份的签名(IBS)方案的研究,采用无可信第三方IBS的密钥管理机制和对应椭圆曲线双线性映射算法实现... 传统XML数字签名基于公共密钥基础设施(PKI)体系和非对称算法,存在管理复杂、计算量大等缺陷。通过对XML数字签名规范和无可信第三方基于身份的签名(IBS)方案的研究,采用无可信第三方IBS的密钥管理机制和对应椭圆曲线双线性映射算法实现XML数字签名,按照XML数字签名规范的要求,对相应XML数字签名实现过程和XML数字签名文件结构进行了设计,并分析了具体实现方式。该XML数字签名方案在保证安全性的同时,克服了传统基于PKI的XML数字签名的缺陷,具有更高的效率。 展开更多
关键词 XML数字签名 基于身份的签名 CZK方案 双线性映射 密钥
下载PDF
无双线性对的轻量级IBS方案
4
作者 王大星 朱鹤鸣 裴定一 《计算机工程》 CAS CSCD 2012年第12期112-114,共3页
基于身份的签名(IBS)方案大多需要复杂的双线性对运算,因此签名算法效率很低,不适用于无线自组织网络的密钥管理、安全路由等通信安全协议。针对该问题,提出一个无需双线性对的IBS方案。在随机预言模型下证明该方案满足不可伪造性,可抵... 基于身份的签名(IBS)方案大多需要复杂的双线性对运算,因此签名算法效率很低,不适用于无线自组织网络的密钥管理、安全路由等通信安全协议。针对该问题,提出一个无需双线性对的IBS方案。在随机预言模型下证明该方案满足不可伪造性,可抵抗选择消息攻击。理论分析表明,与同类方案相比,该方案的计算量和传输代价更小,效率更高。 展开更多
关键词 数字签名 基于身份的签名方案 双线性对 椭圆曲线 可证明安全 随机预言模型
下载PDF
A Practical Identity-Based Signature Scheme
5
作者 LI Chenghua ZHU Jianxin +2 位作者 WU Junjun ZHANG Xinfang DENG Qian 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期692-696,共5页
Many identity-based signature (IBS) schemes solving key escrow were proposed, But the updating of the private keys wasn't discussed in these literatures. For the problem of key update, an identity-based key-insulat... Many identity-based signature (IBS) schemes solving key escrow were proposed, But the updating of the private keys wasn't discussed in these literatures. For the problem of key update, an identity-based key-insulated signature scheme with secure key-updates has been proposed. But their scheme inherited the key escrow property. In this paper, we propose a new identity-based strong key-insulated signature scheme without key escrow. It makes the IBS scheme more applicable to the real world. After analyzing the security and the performance, an application example in E-passport passive authentication scenario is described. 展开更多
关键词 identity-based signature(ibs) key escrow key update key-insulated signature
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部