期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security 被引量:2
1
作者 FEIFei-yu CHENWen CHENKe-fei MAChang-she 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期248-250,共3页
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over ell... In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one. 展开更多
关键词 SIGNCRYPTION identity based public verifiability forward security
下载PDF
Efficient Hierarchical Identity Based Signature Scheme in the Standard Model 被引量:2
2
作者 REN Yanli GU Dawu 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期665-669,共5页
Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public... Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public key generation and identity authentication to lower-level public key generators. Most hierarchical identity based signature schemes are provably secure in the random oracle model or the weak models without random oracles such as gauntlet-ID model. Currently, there is no hierarchical identity based signature scheme that is fully secure in the standard model, with short public parameters and a tight reduction. In this paper, a hierarchical identity based signature scheme based on the q-SDH problem that is fully secure in the standard model is proposed. The signature size is independent of the level of the hierarchy. Moreover, our scheme has short public parameters, high efficiency and a tight reduction. 展开更多
关键词 HIERARCHICAL identity based standard model
原文传递
An Efficient Identity-Based Key Agreement Protocol in a Multiple PKG Environment 被引量:3
3
作者 ZHOU Huan WANG Xiaofeng SU Jinshu 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期455-460,共6页
Identity-based key agreement protocol affords a natural way to combine the participant's identity with its public key. However, most of them just consider the key agreement in a single private key generator (PKG) e... Identity-based key agreement protocol affords a natural way to combine the participant's identity with its public key. However, most of them just consider the key agreement in a single private key generator (PKG) environment. In addition, the existing key agreement protocols have a great computing overhead for mobile computing which is more and more popular today. This paper proposes a new identity based key agreement protocol. With the help of mathematical tools, we make our protocol applied in multiple PKG environment. It also satisfies all the security properties which is set for key agreement protocol. Moreover, some of its time-consuming operations can be delivered to untrusted public computation resources, so its computing complexity can be greatly reduced. 展开更多
关键词 key agreement identity based public computation multiple PKG environment
原文传递
Cryptanalysis of a Completely Anonymous Multi-recipient Signcryption Scheme with Public Verification
4
作者 张波 孙涛 于代荣 《Journal of Donghua University(English Edition)》 EI CAS 2015年第2期240-243,共4页
Anonymity is a very important security objective in network communications.Recently,Pang et al.proposed a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was s... Anonymity is a very important security objective in network communications.Recently,Pang et al.proposed a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was strong existential unforgeability under selective multi-ID,chosen message attack.Unfortunately,by giving concrete attacks,named " inside attack" and " outside attack" respectively,we indicate that Pang et al.'s scheme is not secure in their security model. 展开更多
关键词 multi-recipient signcryption anonymity CRYPTANALYSIS identity based cryptography
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部