期刊文献+

签密方案在分布式协议中的应用 被引量:20

Some Applications of Signcryption Schemes to Distributed Protocols
在线阅读 下载PDF
导出
摘要 该文基于可验证秘密共享思想和对Zheng的签密方案的必要修改,首次构造了一种不需要可信中心的门限签密方案.它能同时达到门限签名和加密的双重目的,实现代价仅和门限签名相当,并具有非否认性质.该文对当前一些分布式密钥分配协议做了分析,并基于Naor的基本思想,重点利用签密方案设计了协议SC DKDS.与其它协议相比,该协议在减低实现成本等方面更为有效,因为它不需要认证信道、秘密信道及复杂的零知识证明等.该文还在RO(RandomOracle,随机预言)模型中给出了以上协议的安全性证明. It is shown in this paper that a kind of new cryptographic primitive proposed by Zheng in 1997, Signcryption, may be applied to construct distributed cryptographic protocols. In fact, the protocols based on Signcryption have the following two properties: Each message exchanged between two participants can be transferred in short data packet, and messages that carry key materials are unforgeable and non-repudiatable without the involvement of a trusted key distribution center. Firstly, based on the modified signcryption scheme of Zheng and Verifiable Secret Sharing (VSS) idea, this paper gives a kind of threshold signcryption scheme without any trusted center for the first time. Furthermore, this scheme can gain its ends of both threshold signature and threshold encryption simultaneously and the costs is much cheaper. In addition, non-repudiation is also offered. Secondly, by analyzing recent distributed key generation protocols, especially Naor's idea, it put forward a new protocol mainly based on signcryption, called SC-DKDS. Compared with others, SC-DKDS does not need any additional costs, such as authentication channels, private channels or any complicated zero knowledge proofs. The security proofs of the protocols mentioned above are given in RO(Random Oracle) model.
出处 《计算机学报》 EI CSCD 北大核心 2005年第9期1421-1430,共10页 Chinese Journal of Computers
基金 国家"九七三"重点基础研究发展规划项目基金(G1999035802) 国家自然科学基金(60253027) 国家杰出青年科学基金(60025205)资助
关键词 签密 门限签密方案 分布式密钥分配协议 可证明安全性 随机预言(RO)模型 signcryption threshold signcryption schemes distributed key generation protocols provable security random oracle model
  • 相关文献

参考文献16

  • 1Desmedt Y.. Some recent research aspects of threshold cryptography. In: Okamoto E., Davida G., Mambo M. eds.. Information Security. Lecture Notes in Computer Science 1396. Berlin: Springer-Verlag. 1997, 158~173.
  • 2Canetti R., Gennaro R., Jarecki S., Krawczyk H., Rabin T.. Adaptive security for threshold cryptosystems. In: Wiener M.ed..Proceedings of Advances in Cryptology-CRYPTO'99. Berlin: Springer-Verlag, 1999, 98~115.
  • 3Needham R., Schroeder M.. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978, 21(12): 993~999.
  • 4Bellare M., Rogaway P.. Provably secure session key distribution--The three party case. In: Proceedings of the 27th Annual ACM Symposium on the Theory of Computing, Las Vegas, Nevada, USA, 1995, 57~66.
  • 5Naor M., Pinkas B., Reingold O.. Distributed pseudo-random functions and KDCs. In: Jacques ed.. Advances in Cryptology-Eurocrypt'99. Lecture Notes in Computer Science 1592. Berlin: Springer-Verlag, 1999, 327~346.
  • 6Daza V., Herranz J., Padro C., Saez G.. A distributed and computationally secure key distribution scheme. In: Chan A.H., Gliger V.eds.. Information Security. Lecture Notes in Computer Science 2433. Berlin: Springer, 2002, 342~356.
  • 7Zheng Y.. Digital signcryption or how to achieve cost(signature& encryption).
  • 8Zheng Y., Imai H.. Using signcryption to build compact and unforgeable key establishment over an ATM network. In: Proceedings of IEEE INFOCOM'98, San Francisco, CA, USA, 1998, 411~418.
  • 9Shamir A.. How to share a secret. Communications of the ACM, 1979, 22(11): 612~613.
  • 10Bellare M., Rogaway P.. Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, USA, 1993, 62~73.

同被引文献186

引证文献20

二级引证文献102

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部