期刊文献+

一种可证明安全的基于身份的高效环签密方案 被引量:1

A PROVABLY SECURE AND IDENTITY-BASED EFFICIENT RING SIGNCRYPTION SCHEME
下载PDF
导出
摘要 为了克服传统公钥基础设施中的证书管理以及提高环签密方案的安全性,提出一种有效的基于身份的环签密方案。通过使用双线性对技术,设计一个在标准模型下基于身份的环签密方案,并分析方案的正确性进行。通过两个困难问题假设CDH问题和DBDH问题,证明方案满足不可伪造性和不可区分性,同时通过与几个现有方案进行比较,指出该方案具有较高的效率。 To eliminate the need of certificates management as used in traditional public key infrastructure and to improve the security of ring signcryption scheme, we present an efficient identity-based ring signcryption scheme. Based on the bilinear pairing technique, we design an identity-based ring signcryption scheme in standard model and analyse its correctness. Meanwhile, it is proved through two difficulty prob- lems assumption of CDH and DBDH that this scheme satisfies the unforgeability and indistinguishability. At the same time, by comparing it with several existing ring signcryption schemes, we point out that this scheme has higher efficiency.
出处 《计算机应用与软件》 CSCD 北大核心 2014年第7期303-306,共4页 Computer Applications and Software
基金 国家自然科学基金项目(61170244)
关键词 环签密 双线性对 计算DIFFIE-HELLMAN问题 判定性Diffie-Hellman问题 标准模型 Ring signcryptioh Bilinear pairing Computational Diffie-Hellman problem Decisional Bilinear Diffie-Hellman problem Standard model
  • 相关文献

参考文献3

二级参考文献24

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 3Dent A W.A survey of certificateless encryption schemes and security models[J].International Journal of Information Security,2008,7(5):349-377.
  • 4Zheng Y.Digital signcryption or how to achieve cost(signature & encryption) ≤cost (signature) + cost (encryption)[C] //LNC S 1294:Advances in Cryptology-Crypto'97.Berlin:Springer-Verlag,1997:165-179.
  • 5Bao Feng,Deng R H.A signcryption scheme with signature directly verifiable by public key[C] //LNCS 1431:Public Key Cryptography-PKC' 98.Berlin:Springer-Verlag,1998:55-59.
  • 6Malone-Lee J,Mao Wenbo.Two birds one stone:signcryption using RSA[C] //LNCS 2612:Topics in Cryptology-CT-RSA 2003.Berlin:Springer-Verlag,2003:211-226.
  • 7Bjφrstad T E,Dent A W.Building better signcryption schemes with tag-KEMs[C] //LNCS 3958:Public Key Cryptography-PKC 2006.Berlin:Springer-Verlag,2006:491-507.
  • 8Gjφsteen K,Kr(a)kmo L.Universally composable signcryption[C] //LNCS 4582:Proceedings of EuroPKI 2007.Berlin:Springer-Verlag,2007:346-353.
  • 9Rivest R L,Shamir A,Tauman Y.How to leak a secret[C] //LNCS 2248:Advances in Cryptology-Asiacrypt 2001.Berlin:Springer-Verlag,2001:552-565.
  • 10Huang X Y,Su W,Yi M.Identity-based ring signcryption scheme:cryptographic primitives for preserving privacy and authenticity in the ubiquitious world[C] //International Conference on Advanced Information Networking and Applications-AINA' 05.Los Alamitos:IEEE Computer Society Press,2005:1-6.

共引文献49

同被引文献15

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部