期刊文献+

一种基于双线性对的可验证无证书环签密方案 被引量:5

Verifiable certificateless ring signcryption scheme based on bilinear pairings
在线阅读 下载PDF
导出
摘要 基于无证书密码体制,提出了一种可验证的环签密方案模型,并给出了基于双线性对的具体方案。该方案能够使消息发送者以匿名的方式发送消息,并可同时实现保密性和认证性两种功能。此外,在需要证实签密人身份时,能够公开验证其身份。在随机预言模型下证明了该方案可以抵抗自适应选择密文攻击。 A new model named verifiable certificateless ring slgncryption scheme was presented. A scheme based on bilinear pairings was also given. Using the scheme, the message sender can anonymously send the message, and the confidentiality and authenticity of the message are realized at the same time. If necessary, the real signer can prove his identity. Thus the scheme has been proved to be secure in the random oracle model.
出处 《计算机应用》 CSCD 北大核心 2007年第9期2167-2169,2173,共4页 journal of Computer Applications
基金 黑龙江省自然科学基金资助项目(F2004-06) 哈尔滨工程大学基础研究基金资助项目(HEUFT05067)
关键词 数字签名 环签密 无证书密码体制 双线性对 signature ring signcryption ceaificateless cryptosystem bilinear pairings
  • 相关文献

参考文献14

  • 1ZHENG Y L.Digital signcryption or how to achieve cost (signature & encryption) 《《cost (signature) + cost (encryption)[C]// Advances in Cryptology-Proceedings CRYPTO '97,LNCS 1294.Berlin:Springer-Verlag,1997:165-179.
  • 2ZHENG Y L,IMAI H.Efficient signcryption scheme on elliptic curves[C]// Proceeding of IFIP/SEC '98.[s.1.]:Chapman & Hall,1998.
  • 3BACK J,STEINFELD R,ZHENG Y L.Formal proofs for the security of signcryption[C]// Proceeding of PKC '02,LNCS 2274.Berlin:Springer-Verlag,2002:81-98.
  • 4MALONE L J.Identity based signcryption[EB/OL].[2007-02-10].http://eprint.iacr.org/2002/0798.
  • 5SHAMIR A.Identity based cryptosystems and signature schemes[C]// Advances in Cryptology-Crypto '84,LNCS 196.Berlin:Springer-Verlag,1984:47-53.
  • 6AlRIYAMI S S,PATERSON K G.Certificateless public key cryptography[C]// Advances in Cryptography Asiacrypt 2003,LNCS 2894.Berlin:Springer-Verlag,2003:452-473.
  • 7RIVEST R,SHAMIR A,TAUMAN Y.How to leak a secret[C]// Proceeding Asiacrypt '01,LNCS 2248.Berlin:Springer-Verlag,2001:552-565.
  • 8LEE K C,WEN H A,HWANG T.Convertible ring signature[J].IEE Proceedings Communications,2005,152(4):411-414.
  • 9甘志,陈克非.一个新的可验证环签名方案(英文)[J].中山大学学报(自然科学版),2004,43(A02):132-134. 被引量:6
  • 10黄欣沂,张福泰,伍玮.一种基于身份的环签密方案[J].电子学报,2006,34(2):263-266. 被引量:18

二级参考文献79

  • 1马春光,杨义先,胡正名.一种加入有效期的离线电子现金方案[J].计算机工程与设计,2004,25(4):484-485. 被引量:4
  • 2马春光,杨义先.可转移离线电子现金[J].计算机学报,2005,28(3):301-308. 被引量:14
  • 3黄振杰,郝艳华,王育民,陈克非.一个高效的有向传递签名方案[J].电子学报,2005,33(8):1497-1501. 被引量:7
  • 4马春光,杨义先,胡正名,武朋.可直接花费余额的电子支票系统[J].电子学报,2005,33(9):1562-1566. 被引量:8
  • 5van Antwerpen H.. Electronic cash [M.S. dissertation]. CWI, Amsterdam, 1990.
  • 6Chaum D., Pedersen T.P.. Transferred cash grown in size. In: Rueppel R.A. ed. Advanced in Cryptology-EUROCRYPT'92, LNCS658, Berlin: Springer-Verlag, 1993, 390~407.
  • 7D'Amiano S., Crescenzo G.Di. . Methodology for digital money based on general cryptographic Tools. In: Santis De. ed. Advanced in Cryptology-EUROCRYPT'94, LNCS950, Berlin: Springer-Verlag, 1995, 156~170.
  • 8Sander T., Ta-Shma A.. Auditable, anonymous electronic cash. In: Advanced in Cryptology-CRYPTO'99, LNCS1666, Berlin: Springer-Verlag, 1999, 555~572.
  • 9Sander T., Ta-Shma A.. A new approach for anonymous control in electronic cash. In: Franklin, Matthew ed. Proceedings of the 3rd International Conference on Financial Cryptography-FC'99, LNCS1648, Berlin: Springer-Verlag, 1999, 46~61.
  • 10Okamoto T., Ohta K.. Disposable zero-knowledge authentication and their application to untraceable electronic cash. In: Brassard G. ed. Advanced in Cryptology-CRYPTO'89 LNCS435, Berlin: Springer-Verlag, 1990, 481~496.

共引文献36

同被引文献36

  • 1祁正华,杨庚,任勋益.Provably Secure Certificateless Ring Signcryption Scheme[J].China Communications,2011,8(3):99-106. 被引量:11
  • 2Rivest R,Shamir A,Tauman M.How to Leak a Secret[C]//Proc.of AsiaCrypt'01.[S.l.]:Springer-Verlag,2001.
  • 3Lv Jiqian,Wang Xinmei.Verifiable Ring Signature[C]//Proc.of the 9th International Conference on Distributed Multimedia Systems.Miami,USA:[s.n.],2003.
  • 4Shamir A.An Identity-based Cryptosystems and Signature Scheme[C]//Proc.of Crypto'84.[S.l.]:Springer-Verlag,1984.
  • 5Zhang Fanguo,Kim K.ID-based Blind Signature and Ring Signature from Pairings[C]//Proc.of AsiaCrypt'02.[S.l.]:Springer-Verlag,2002.
  • 6Al-Riyami S S,Paterson K G.Certificateless Public Key Cryptography[C]//Proc.of AsiaCrypt'03.[S.l.]:Springer-Verlag,2003.
  • 7Saez H G.Forking Lemmnas for Ring Signature Scheme[C]//Proc.of IndoCrypt'03.[S.l.]:Springer-Verlag,2003.
  • 8Shamir A. Identity-based cryptosystems and signature sch- emes [ C ]//Advances in Cryptology-Crypto 1984, LNCS 196. [ s. l. ] :Springer-Verlag, 1984:47-53.
  • 9Al-Riyami S, Paterson K. Certificateless Public Key Cryptog- raphy[ C ]//Advances in Cryptology -SIACRYPT'03, LNCS 2894. [ s. l. ]: [ s. n. ] ,2003:452-473.
  • 10Li X, Chen K, Sun L. Certificateless signature and proxy signa- ture schemes from bilinear Pairings [ J ]. Lithuanian Mathemat- ical Journal ,2005,45 ( 1 ) :76-83.

引证文献5

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部