期刊文献+

一个基于身份的多接收者签密方案

A multi-receiver identity-based signcryption
在线阅读 下载PDF
导出
摘要 利用双线性对提出一种基于身份的多接收者的签密方案,为同时有多名接收者的签密问题提供了解决途径。该方案既保持了基于身份加密的优点,又具有可公开验证性,且安全性好。该方案具有很高的执行效率,签密过程只需一次双线性对运算,接收者人数越多,其效率的优势会越加明显。 Based on the identity-based signcryption,this paper proposed a multi - receiver identity- based signcryption scheme, in which some good characteristics of bilinear pairing are used. The new scheme offers a good solution to the problem of signcryption with a lot of multi- receiver. Additionally, this scheme which can achieve confidentiality, public verification and high security. Only one pairing computation is needed in it to signcrypt a single message for all receivers.As a result, the efficiency gain of the new scheme is huge especiaily when there are a large number of recipients.
作者 陈奇峰
出处 《计算机安全》 2009年第6期27-29,共3页 Network & Computer Security
关键词 签密 基于身份签密 多接收者 signcryption identity-based signcryption multi--receiver
  • 相关文献

参考文献6

二级参考文献44

  • 1陈瑞虎,高峰修,马传贵.GOST门限签密方案[J].微计算机信息,2005,21(11X):9-10. 被引量:5
  • 2[1]William Stallings,密码编码学与网络安全-原理与实践(第四版).刘丽珍,王丽娜,傅建明,等译[M].北京:电子工业出版社.
  • 3[1]ZHENG Y.Digital Signcryption or How to Achieve Cost (signature & encryption) 《《Cost (signature) +Cost (encryption)[A].CYPTOp97,Lecture Notes in Computer Science 1294[C].Berlin:Springer-Verlag,1997.165-179.
  • 4[2]Shamir A.Identity based cryptosystems and signature schemes[C].Advances in Cryptology-Crypto'84,LNCS 196.Berlin:Springer-Verlag,1984.47-53.
  • 5[3]Baek Joonsang,Zheng Yuliang.Identity-based threshold decryption[C].PKC'04,LNCS 2947.Berlin:Springer-Verlag,2004.262-276.
  • 6[4]Boneh D,Franklin M.Identity-based encryption from the weil pairing[C].Crypto'01,LNCS 2139.Berlin:Springer-Verlag,2001.213-229.
  • 7[5]Horster P,Michels M,Petersen H.Authenticated Encryption Scheme with Low Communication Costs[J].Electronic Letters,1994,30(15):1212-1213.
  • 8[6]A.Shamir.Identity based cryptosystems and signature schemes[C].In Advances in Cryptology-Crypto'84,volume 0196 of LectureNotes in Computer Science,Springer-Verlag,1984.47-53.
  • 9[7]Zheng Y.Signcryption and its applications in efficient public key solutions[C].Proceedings of Information Security Workshop,1998:291-312
  • 10[8]Malone-Lee.J Identity-based signcryption[EB/OL].http://eprint.iacr.org/2002/098.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部