期刊文献+

无随机预言模型的基于模糊身份签密方案 被引量:1

Signcrption scheme based on fuzzy identity without random oracles
下载PDF
导出
摘要 在随机预言模型下Hash函数被视为一个完全随机的理想模型,实际应用中却无法构造。以Sahai和Waters的方案为基础,利用椭圆曲线上的双线性对性质及门限秘密共享的思想,提出了一个新的模糊身份签密方案。与最近Zhang等人提出的模糊身份签密方案相比,该方案的构造没有采用Hash函数,避免了Hash函数返回值无随机性的缺点,且系统公开参数较少,安全性可规约到计算Diffie-Hellman(CDH)和离散对数(DLP)困难假定,从而能更好地满足实际应用需求。 Aimed to the Hash function's returning value is not truly random, based on Sahai and Waters' scheme, using bilinear paring of elliptic curves and threshold secret sharing, a new fuzzy identity based signcryption scheme without the random oracle model is proposed. Compared with Zhang et al recently proposed signcryption scheme, this scheme doesn't use Hash function, the efficiency is higher and public parameters are less. The scheme's security is reduced to computation Diffie-Hellman and discrete logarithm assumptions. So that it can better meet the needs of practical applications.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第1期92-95,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60963023) 贵州省自然科学基金项目([2009]2113) 贵州大学博士基金项目(2007-040)
关键词 模糊身份 签密 双线性对 无随机预言 秘密共享 fuzzy identity signcryption bilinear pairings without random oracles secret sharing
  • 相关文献

参考文献15

  • 1Sahai A, Waters B. Fuzzy identity-based encryption [G]. LNCS 3494: Advances in Cryptology-Eurocrypto, 2005: 457-473.
  • 2YANG Piyi, CAO Zhenfu, DONG Xiaolei. Fuzzy identity based signature [ EB/OL ] . http.. //mirror. crypto/eprint, iacr. org/ 2008/02. pdf.
  • 3LI Ximing, YANG Bo, ZHANG Mingwu. New constructionof fuzzy identity-based encryption [C]. WASE International Conference on Information Engineering, 2009.
  • 4Baek J, Susilo W, Zhou J. New constructions of fuzzy identity- based encryption [C]. the 2nd ACM Symposittm on Information, Computer and Communications Security, 2007: 368-370.
  • 5Fang L, Wang J, Ren Y. Chosen-ciphertext secure fuzzy iden- tity based encryption without ROM [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 (6).. 646-650.
  • 6Burner A, Dowlingt. A biometric identity based signature scheme [EB/OL] . [2007-12-06] . http: //Ieeexplore lee; org.
  • 7WEI Chen, LI Zhu, CAO Xiaomei, et al. A novel fuzzy iden- tity-based signature with dynamic threshold [C]. International Conference on Network and System Security, 2009.
  • 8WANG Changii, LIU Weichen. A fuzzy identity based signa- ture scheme [EB/OL] . http: //Ieeexplore. ieee. org, 2009.
  • 9ZHANG Mingwu, Yang Bo, Tsuyoshi Takagi. Fuzzy biornetric sign cryption scheme with bilinear pairings in the standard model [G]. LNCS 6122 :PAISI Intelligence and Security Informafics,2010: 77-87.
  • 10Waters Bo Efficient identity-based encryption without random oracles [G]. Lectures Notes in Computer Science 3494: Ad- vances in Cryptology Euro-Crypt, 2005: 114-127.

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部