期刊文献+

标准模型下基于身份的广义签密方案 被引量:2

Identity-based generalized signcryption in standard model
在线阅读 下载PDF
导出
摘要 首次对标准模型下基于身份广义签密体制进行了研究。利用双线性对,提出了基于身份的广义签密方案,并在标准模型下证明了方案的安全性。结果表明,方案的保密性在DBDH假设下是适应性选择密文攻击下不可区分的,在CDHP假设下方案是适应性选择消息攻击下存在性不可伪造的。与其他两个基于身份广义签密方案相比,本方案效率较高,且是在标准模型下可证明是安全的。 This paper conducted a research on identity-based gengeralized signcryption under the standard model for the first time. It proposed an identity-based generalized signcryption scheme and gave its security proof in the standard model. It shows that the confidentiality satisfies the semantic security notion IND-CCA2 under the decisional bilinear Diffie-Hellman assumption and the unforgeability against adaptive chosen message attack derives under the computational Diffie-Hellman assumption. Compare with the two identity-based generalized signcryption schemes,the proposed one is comparably efficient and provably secure under standard model.
出处 《计算机应用研究》 CSCD 北大核心 2010年第10期3851-3854,3858,共5页 Application Research of Computers
基金 国家"863"计划资助项目(2009AA01Z417) 国家自然科学基金资助项目(90704003)
关键词 基于身份签密 广义签密 标准模型 双线性对 可证安全 identity-based signcryption generalized signcryption standard model bilinear pairing provable security
  • 相关文献

参考文献9

  • 1ZHENG Yu-liang. Digital signcryption or how to achieve cost (signature&encryption) < < cost ( signature ) + cost ( encryption ) [C]//Proc of Advances in Cryptology-Crypto' 97. London, UK:Springer-Verlag, 1997: 165-179.
  • 2韩益亮,杨晓元.ECDSA可公开验证广义签密[J].计算机学报,2006,29(11):2003-2012. 被引量:30
  • 3SHAMIR A: Identity-based cryptosystems and signature schemes [ C ]//Proc of Advances in Cryptology-Crypto' 84. New York : Springer-Verlag, 1984:47- 53.
  • 4LAL S, KUSHWAH P. ID-based generalized signeryption, Report 2008/084[ R]. [ S. l. ] : Cryptolngy ePrint Archive, 2008.
  • 5张洪礼,赵静,刘文远.高效的基于双线性对和身份的广义签密方案[J].计算机应用研究,2010,27(2):678-681. 被引量:9
  • 6WATERS B. Efficient identity based encryption without random oracle [ C ]//Proc of EUROCRYPT. Berlin : Springer-Verlag, 2005 : 114- 127.
  • 7PATERSON K, SCHULDT J. Efficient identity based signatures secure in the standard model[ C ]//Proc of ACISP. [ S. l. ] :Springer- Verlag, 2006 : 207- 222.
  • 8张波,徐秋亮.无随机预言机的基于身份多签密方案(英文)[J].计算机学报,2010,33(1):103-110. 被引量:16
  • 9CHEN Li-qun, MALON-LEE J. Improved identity-based signcryption [C]//Proc of Public Key Cryptography. Berlin: Springer-Verlag, 2005:362- 379.

二级参考文献47

  • 1韩益亮,杨晓元.ECDSA可公开验证广义签密[J].计算机学报,2006,29(11):2003-2012. 被引量:30
  • 2Shamir A. Identity-based cryptosystem and signature scheme//Proeeedings of the CRYPTO 1984. California, USA, 1984:47-53.
  • 3Boneh D, Franklin M. Identity-based encryption from the Weil pairings//Proeeedings of the CRYPTO 2001. California, USA, 2001: 213-229.
  • 4Hess F. Efficient identity based signature schemes based on pairings//Proceedings of the SAC 2002. Madrid, Spain, 2002:310-324.
  • 5Cha J, Cheon J. An identity-based signature from gap DiffieHellman groups//Proceedings of the PKC 2003. Florida, USA, 2003:18- 30.
  • 6Waters R. Efficient identity based encryption without random oracles//Proceedings of the EUROCRYPT 2005. Aarhus, Denmark, 2005:114-127.
  • 7Paterson K, Schuldt J. Efficient identity based signatures secure in the standard model//Proceedings of the ACISP 2006. Melbourne, Australia, 2006:207-222.
  • 8Zheng Y. Digital signcryption or how to achieve cost (signature & encryption)<<cost(signature)+cost(encryption)// Proceedings of the CRYPTO 1997. California, USA, 1997: 165-179.
  • 9Malone-Lee J. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002.
  • 10Libert B, Quisquator J. A new identity based signcryption scheme from pairings//Proceedings of the 2003 IEEE Information Theory Workshop. Paris, France, 2003: 155-158.

共引文献44

同被引文献16

  • 1韩益亮,杨晓元.ECDSA可公开验证广义签密[J].计算机学报,2006,29(11):2003-2012. 被引量:30
  • 2Y Zheng. Digital signcryption or how to achieve cost(signature&encryption) 《《 cost(signcryption)+cost(encryption)[A].Santa Barbara,California,USA,1997.165-179.
  • 3F.Bao,R.H.Deng. A signcryption scheme with signature directly verifiable by publickey[A].Pacifico Yokohama,Japan,1998.55-59.
  • 4P.Steinfeld. A signcryption scheme based on integer factorization[A].NSW,Australia,2000.308-322.
  • 5J.B.Shin,K.Lee,K.Shin. New DSA-verifiable signcryption scheme[A].Seoul,Korea,2002.35-47.
  • 6J.Malonelee,W.Mao. Two birds one stone:signcryption using P SA[A].San Francisco,CA,USA,2003.211-225.
  • 7SHAMIR A. Identity-based cryptosysterns and signature schemes[A].New York:Springer-Verlag,1984.47-53.
  • 8BONEH D,FRANKL INM. Identity-based encryption from the Weil pairing[A].Beilin:Springer-Verlag,2001.213-229.
  • 9Sunder L,Prashant K. ID-based Generalized Signcryption[EB/OL].http://eprint.iacr.org/2008/084.pdf,2008.
  • 10张洪礼,赵静,刘文远.高效的基于双线性对和身份的广义签密方案[J].计算机应用研究,2010,27(2):678-681. 被引量:9

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部