期刊文献+

无需随机预言可证安全的基于ID的身份认证方案 被引量:4

Provably Secure ID-Based Identification Scheme without Random Oracle
在线阅读 下载PDF
导出
摘要 以安全和高效的数字签名方案为基础,给出了2个高效的基于ID的身份认证方案。基于强DH假设,证明了一个方案对于被动攻击是防止冒充安全的,另一个方案对于主动和并行攻击是防止冒充安全的。 Based on the efficient and provably secure signature scheme, two efficient ID - based identification schemes are pres- ented under DH assumption. Without random oracle, one ID - based identification scheme is secure against impersonation under passive attack and the other one is secure against impersonation under active and concurrent attack.
作者 胡国政 洪帆
出处 《武汉理工大学学报(信息与管理工程版)》 CAS 2007年第2期66-69,共4页 Journal of Wuhan University of Technology:Information & Management Engineering
关键词 身份认证方案 随机预言 可证安全 基于ID的密码学 identification scheme random oracle provable security ID -based cryptography
  • 相关文献

参考文献5

  • 1FIAT A,SHAMIR A.How to prove yourself:practical solutions to identification and signature problems[C].Advances in Cryptology-CRYPTO'86.Berlin:Springer-Verlag,1987:186-194.
  • 2KUROSAWA K,HENG S H.From digital signature to ID-based identification/signature[C].Public Key Cryptography-PKC'04.Berlin:Springer-Verlag,2004:248-261.
  • 3BELLARE M,NAMPREMPRE C,NEVEN G.Security proofs for identity-based identification and signature schemes[C].Advances in Cryptology-EUROCRYPT'04.Berlin:Springer-Verlag,2004:268-286.
  • 4BONEH D,BOYEN X.Short signatures without random oracles[C].Advances in Cryptology-EUROCRYPT '04.Berlin:Springer-Verlag,2004:56-73.
  • 5BELLARE M,PALACIO A.GQ and schnorr identification schemes:proofs of security against impersonation under active and concurrent attacks[C].Advances in Cryptology -CRYPTO '02.Berlin:Springer-Verlag,2002:162-177.

同被引文献28

  • 1GUILLOU L S, QUISQUATER J J. A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory [ C ]//Eurocrypto 88. Davos, Switzerland, 1958.
  • 2SCHNORR C. Efficient identification and signatures for smart cards[C] JJCrypto89. Santa Barbara, USA, 1990.
  • 3BELLARE M, PALACIOY A. GQ and Schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks [ C ]//Crypto 2002. Santa Barbara, USA, 2002.
  • 4BELLARE M, NAMPREMPRE C, NEVEN G. Security proofs for identity-based identification and signature scheme [ C ]// Eurocrypt'04. InterLaken, Switzerland, 2004.
  • 5LIBERT B, QUISQUATER J J. On constructing certificateless cryptosystems from identity based encryption [ C ]//PKC 2006. New York City, USA, 2006.
  • 6ZHANG Z F, WONG D S, XU J, FENG D G. Certificateless public-key signature: security model and efficient construction[C]//ACNS 2006. Singapore, 2006.
  • 7SATOH T. On pairing inversion problems [ C ] //Pairing 2007. Tokyo, Japan, 2007.
  • 8GUILLOU L S, QUISQUATER J J. A practical zeroknowledge protocol fitted to security microprocessor minimizing both transmission and memory[C]//Eurocrypto' 88, LNCS 330. Berlin: Springer-Verlag, 1988.. 123-128.
  • 9SCHNORR C P. Efficient identification and signatures for smart cards[C]//Crypto' 89, LNCS 435. Berlin: Springer-Verlag, 1990 : 239-252.
  • 10BELLARE M, PALACIO A. GQ and schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks[C]//YUNG M. Crypto ' 2002,. Berlin: Springer-Verlag, 2002, LNCS 2442 : 167-177.

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部