期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings 被引量:5
1
作者 LI Fagen HU Yupu LIU Shuanggen 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期17-20,共4页
Signcryption is a cryptographic primitive that performs signature and encryption simultaneously, at lower computational costs and communication overheads than the signature-then- encryption approach. In this paper, we... Signcryption is a cryptographic primitive that performs signature and encryption simultaneously, at lower computational costs and communication overheads than the signature-then- encryption approach. In this paper, we propose an efficient multi-recipient signcryption scheme based on the bilinear pairings, which broadcasts a message to multiple users in a secure and authenticated manner. We prove its semantic security and unforgeability under the Gap Diffie-Hellman problem assumption in the random oracle model. The proposed scheme is more efficient than re-signcrypting a message n times using a signcryption scheme in terms of computational costs and communication overheads. 展开更多
关键词 signcryption multi-recipient signcryption bilinear pairings provable security
下载PDF
Provably Secure General Aggregate Signcryption Scheme in the Random Oracle Model 被引量:13
2
作者 Qi Zhenghua Ren Xunyi Yang Geng 《China Communications》 SCIE CSCD 2012年第11期107-116,共10页
To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggre... To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggregate signature algorithm are combined in a practical and secure manner to form the general aggregate signcryption scheme's schema and concept, and a new secure, efficiently general aggregate signcryption scheme, which allows the aggregation of n distinct signcryptions by n distinct users on n distinct messages, is proposed. First, the correction of the GASC scheme is analyzed. Then, we formally prove the security of GASC in the random oracle models IND-CCA2 and EUF-CMA under the DBDHP assumption and the DLP assumption, respectively. The results show that the GASC scheme is not only secure against any probabilistic polynomial-time IND-GASC-CCA2 and EUF-GASC-CMA adversary in the random oracle models but also efficient in pairing ê computations. In addition, the GASC scheme gives an effective remedy to the key escrow problem, which is an inherent issue in IBC by splitting the private key into two parts, and reduces the communication complexity by eliminating the interaction among the senders (signers) before the signcryption generation. 展开更多
关键词 identity-based cryptography signcryption aggregate signature bilinear pairing
下载PDF
A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain 被引量:2
3
作者 Xizi Peng Jinquan Zhang +3 位作者 Shibin Zhang Wunan Wan Hao Chen Jinyue Xia 《Computer Systems Science & Engineering》 SCIE EI 2021年第5期265-281,共17页
In the existing Electronic Health Records(EHRs),the medical information of patients is completely controlled by various medical institutions.As such,patients have no dominant power over their own EHRs.These personal d... In the existing Electronic Health Records(EHRs),the medical information of patients is completely controlled by various medical institutions.As such,patients have no dominant power over their own EHRs.These personal data are not only inconvenient to access and share,but are also prone to cause privacy disclosure.The blockchain technology provides a new development direction in the medical field.Blockchain-based EHRs are characterized by decentralization,openness and non-tampering of records,which enable patients to better manage their own EHRs.In order to better protect the privacy of patients,only designated receivers can access EHRs,and receivers can authenticate the sharer to ensure that the EHRs are real and effective.In this study,we propose an identity-based signcryption scheme with multiple authorities for multiple receivers,which can resist N-1 collusion attacks among N authorities.In addition,the identity information of receivers is anonymous,so the relationship between them and the sharer is not disclosed.Under the random oracle model,it was proved that our scheme was secure and met the unforgeability and confidentiality requirements of signcryption.Moreover,we evaluated the performance of the scheme and found that it had the moderate signcryption efficiency and excellent signcryption attributes. 展开更多
关键词 Electronic health records blockchain identity-based signcryption multiple authorities multiple receivers
下载PDF
Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system
4
作者 Huifang YU Xiaoping BAI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第3期461-471,共11页
Electronic healthcare systems can offer convenience but face the risk of data forgery and information leakage.To solve these issues,we propose an identity-based searchable attribute signcryption in lattice for a block... Electronic healthcare systems can offer convenience but face the risk of data forgery and information leakage.To solve these issues,we propose an identity-based searchable attribute signcryption in lattice for a blockchain-based medical system(BCMS-LIDSASC).BCMS-LIDSASC achieves decentralization and anti-quantum security in the blockchain environment,and provides fine-grained access control and searchability.Furthermore,smart contracts are used to replace traditional trusted third parties,and the interplanetary file system(IPFS)is used for ciphertext storage to alleviate storage pressure on the blockchain.Compared to other schemes,BCMS-LIDSASC requires smaller key size and less storage,and has lower computation cost.It contributes to secure and efficient management of medical data and can protect patient privacy and ensure the integrity of electronic healthcare systems. 展开更多
关键词 Blockchain identity-based searchable attribute signcryption Distributed storage NTRU lattice
原文传递
An Efficient Identity-Based Anonymous Signcryption Scheme 被引量:4
5
作者 YU Yong LI Fagen XU Chunxiang SUN Ying 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期670-674,共5页
Signcryption is a cryptographic primitive that performs encryption and signature in a single logical step more efficiently than sign-then-encrypt approach. Till now, various kinds of signcryption schemes have been pro... Signcryption is a cryptographic primitive that performs encryption and signature in a single logical step more efficiently than sign-then-encrypt approach. Till now, various kinds of signcryption schemes have been proposed. Among them, the requirement of signcrypter's privacy protection is needful in some practical applications. In this paper, a new identity-based anonymous signcryption scheme from hilinear pairings, which is the organic combination of identity-based ring signature and encryption scheme, is proposed. The proposed scheme is indistinguishable against the chosen ciphertext attack under the Decisional Bilinear Diffie-Hellman assumption in the random oracle model. Its unforgeability relies on the computational Diffieellman problem. Compared with the previous schemes, the new scheme is more efficient in computation. 展开更多
关键词 identity-based ring signature anonynaous signcryption bilinear pairing
原文传递
Identity-based aggregate signcryption in the standard model from multilinear maps 被引量:4
6
作者 Hao WANG Zhen LIU +1 位作者 Zhe LIU Duncan S. WONG 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第4期741-754,共14页
Signcryption is a public key cryptographic method that achieves unforgeability and confidentiality simultaneously with significantly smaller overhead than that required by "digital signature followed by public key en... Signcryption is a public key cryptographic method that achieves unforgeability and confidentiality simultaneously with significantly smaller overhead than that required by "digital signature followed by public key encryption". It does this by signing and encr.ypting a message in a single step. An aggregate signcryption scheme allows individual signcryption ciphertexts intended for the same recipi- ent to be aggregated into a single (shorter) combined ciphertext without losing any of the security guarantees. We present an aggregate signcryption scheme in the identity-based setting using multilinear maps, and provide a proof of security in the standard model. To the best of our knowledge, our new scheme is the first aggregate signcryption scheme that is secure in the standard model. 展开更多
关键词 identity-based aggregate signcryption multilinear maps standard model GGH framework
原文传递
Analysis and Improvement of Authenticatable Ring Signcryption Scheme 被引量:9
7
作者 李发根 Shirase Masaaki Takagi Tsuyoshi 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期679-683,共5页
We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore, we propose an improved scheme that remedies the weakness of the... We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme.The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme.We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability. 展开更多
关键词 identity-based cryptography bilinear pairings ring signcryption ring signature
原文传递
A Secure NDN Framework for Internet of Things Enabled Healthcare 被引量:1
8
作者 Syed Sajid Ullah Saddam Hussain +1 位作者 Abdu Gumaei Hussain AlSalman 《Computers, Materials & Continua》 SCIE EI 2021年第4期223-240,共18页
Healthcare is a binding domain for the Internet of Things(IoT)to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet.The current IP-based Internet ar... Healthcare is a binding domain for the Internet of Things(IoT)to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet.The current IP-based Internet architecture suffers from latency,mobility,location dependency,and security.The Named Data Networking(NDN)has been projected as a future internet architecture to cope with the limitations of IP-based Internet.However,the NDN infrastructure does not have a secure framework for IoT healthcare information.In this paper,we proposed a secure NDN framework for IoTenabled Healthcare(IoTEH).In the proposed work,we adopt the services of Identity-Based Signcryption(IBS)cryptography under the security hardness Hyperelliptic Curve Cryptosystem(HCC)to secure the IoTEH information in NDN.The HCC provides the corresponding level of security using minimal computational and communicational resources as compared to bilinear pairing and Elliptic Curve Cryptosystem(ECC).For the efficiency of the proposed scheme,we simulated the security of the proposed solution using Automated Validation of Internet Security Protocols and Applications(AVISPA).Besides,we deployed the proposed scheme on the IoTEH in NDN infrastructure and compared it with the recent IBS schemes in terms of computation and communication overheads.The simulation results showed the superiority and improvement of the proposed framework against contemporary related works. 展开更多
关键词 Named data networking healthcare identity-based signcryption
下载PDF
A Confidential Non-Interactive Origin-Guarantee Message Transfer Scheme with Uniqueness
9
作者 Ya-Fen Chang Shun-Meng Pan 《Journal of Electronic Science and Technology》 CAS 2013年第2期225-229,共5页
A biometric identity-based signcryption scheme is presented, which combines signature and encryption. In the proposed scheme, biometric information is used to construct the private key to ensure uniqueness, and a user... A biometric identity-based signcryption scheme is presented, which combines signature and encryption. In the proposed scheme, biometric information is used to construct the private key to ensure uniqueness, and a user's identity is the corresponding public key to make the message transfer non-interactive. The proposed scheme is shown to provide confidentiality and unforgeability in the random oracle model 展开更多
关键词 BIOMETRICS encryption identity-based signature signcryption uniqueness.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部