期刊文献+

高效的无证书的在线/离线签密方案 被引量:2

Efficient Certificateless On-line/Off-line Signcryption Scheme
在线阅读 下载PDF
导出
摘要 在线/离线签密方案具有资源耗费小的特点,但已有的在线/离线签密方案大多是是基于证书的密码体制或者基于身份的密码体制提出的,都存在证书的管理问题或密钥的托管问题。基于无证书密码体制的优点,提出了一种高效的无证书的在线/离线签密方案。分析表明,该方案不需要证书的管理,也没有密钥的托管问题,满足签密所要求的所有性质,且在效率上优于已有的基于身份的在线/离线签密方案以及无证书的签密方案。 On-line/off-line signcryption has the characteristics of low computation cost However, the existing on-line/off-line signcryption schemes arc based on certificate public key cryp tography and identity-based cryptography, which have the problems of certificate management or key escrow. Based on the merit of certificateless public key cryptography, an efficient certificateless on-line/off-line signcryption was proposed. The result shows that the new on-line/off-line signcryption scheme solves all the problems of certificate management and key escrow, and also satisfies all the required characteristics of signcryption. It is more efficient than the existed D)based on-line/off-line signcryption schemes and certificatcless on-line/off-line signcryption schemes.
出处 《计算机科学》 CSCD 北大核心 2010年第5期103-106,共4页 Computer Science
基金 国家自然科学基金资助项目(60602061) 国家自然科学基金资助项目(60803131)资助
关键词 在线/离线签密 无证书的密码系统 双线性对 随机预言模型 On-line/off-line signcryption Certificateless cryptography Bilinear pairings Random oracle model
  • 相关文献

参考文献10

  • 1Zheng Y. Digital signcryption or how to achieve cost (signature encryption) (cost (signature) + cost (encryption)) [C]//Proceedings of the Cryptology-CRYPTO'97. Santa Barbara, California, USA, 1997:165-179.
  • 2Shamir A. Identity-based cryptosystems and signature schemes[C]//Proceedings of the Cryptology - CRYPTO'84. Santa Barbara, California, USA, 1984: 47-53.
  • 3Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[C]// Proceedings of the ASIACRYPT 2003. Taipei, Taiwan, 2003 : 452-473.
  • 4Barbosa M, Farshim P. Certificateless Signcryption [EB/OL]. http://eprint, iacr. org/2008/143, pdf, 2008.
  • 5Wu Chen-huang, Chen Zhi-xiong. A New Efficient Certificateless Signeryptlon Scheme[C]//Proceedings of the ISISE' 08, Shanghai, China, 2008 : 661-664.
  • 6Selvi S S D, Vivek S S, Shukla D, et al. Efficient and Provably Secure Certificateless Multi-receiver Signcryption [C]//Proceedings of the ProvSec 2008. Shanghai, China, 2008 : 52-67.
  • 7李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:74
  • 8Even S, Goldreich O, Macali S. On-line/off-line digital signatures[J]. Journal of Cryptology, 1996,9:35-67.
  • 9Zhang F, Mu Y, Susilo W. Reducing security overhead for mobile networks [C]//Proceedings of the 19th International Conference on Advanced Information Networking and Applications. Taipei, Taiwan, 2005 : 398-403.
  • 10Sun Dong-dong, Huang Xin-yi, Mu Yi, et al. Identity-Based Online/Off-line Signcryption [C]// Proceedings of the IFIP International Conference on Network and Parallel Computing. Shanghai, China, 2008:34-41.

二级参考文献15

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:20
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:105
  • 3Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179
  • 4Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81
  • 5Pang X. , Tan K. L. , Wang Y. , Ren J.. A secure agent-mediated payment protocol. In: Deng R. H. , Qing S. , Bao F. ,Zhou J. eds.. Information and Communications Security-ICICS 2002, Lecture Notes in Computer Science 2513. Berlin:Springer-Verlag, 2002, 422-433
  • 6Shamir A.. Identity-based cryptosystems and signature schemes. In: Blakley G. R. , Chaum D. eds.. Advances in Cryptology-CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984, 47-53
  • 7Boneh D. , Franklin M.. Identity-based encryption from the Weil pairing. In: Kilian J. ed.. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001, 213-229
  • 8Malone-Lee J.. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, IACR, 2002
  • 9Libert B. , Quisquater J.. A new identity based signcryption schemes from pairings. In: Proceeding of the 2003 IEEE Information Theory Workshop, Paris, France, 2003, 155-158
  • 10Nalla D., Reddy K. C.. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report2003/066, IACR, 2003

共引文献73

同被引文献7

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部