期刊文献+

标准模型下多个PKG的基于身份广义签密 被引量:7

Identity Based Generalized Signcryption Scheme for Multiple PKGs in Standard Model
在线阅读 下载PDF
导出
摘要 广义签密是指除了能实现签密功能,还可单独实现加密和认证功能的密码机制。该文定义了不同PKG环境下基于身份的广义签密方案较为全面的安全模型,并提出一个具体方案,进而在标准模型下证明了方案的安全性。和已有的不同PKG环境下基于身份签密方案相比,文中方案的效率较高,且应用范围更为广泛。 Generalized signcryption is a cryptographic primitive which could not only realize signcryption but also provide encryption and authentication alone.In this paper,the formal definition and a complete security notion of identity based generalized signcryption for multiple PKGs is defined.A concrete scheme is also proposed with security proof in standard model.Compared with several existing identity based signcryption schemes for multiple PKGs,the new scheme is more efficient and flexible.
作者 冀会芳 韩文报 刘连东 Ji Hui-fang;Han Wen-bao;Liu Lian-dong(Information Engineering University,Zhengzhou 450002,China)
机构地区 信息工程大学
出处 《电子与信息学报》 EI CSCD 北大核心 2011年第5期1204-1210,共7页 Journal of Electronics & Information Technology
基金 国家973计划项目(2007CB807902) 新世纪优秀人才计划(NCET-07-0384) 全国优秀博士学位论文作者专项基金(FANEDD-2007B74)资助课题
关键词 基于身份密码 广义签密 不同PKG环境 双线性对 标准模型 Identity based cryptosystem Generalized signcryption Multiple PKG environments Bilinear pairings Standard model
  • 相关文献

参考文献3

二级参考文献47

  • 1韩益亮,杨晓元.ECDSA可公开验证广义签密[J].计算机学报,2006,29(11):2003-2012. 被引量:30
  • 2Shamir A. Identity-based cryptosystem and signature scheme//Proeeedings of the CRYPTO 1984. California, USA, 1984:47-53.
  • 3Boneh D, Franklin M. Identity-based encryption from the Weil pairings//Proeeedings of the CRYPTO 2001. California, USA, 2001: 213-229.
  • 4Hess F. Efficient identity based signature schemes based on pairings//Proceedings of the SAC 2002. Madrid, Spain, 2002:310-324.
  • 5Cha J, Cheon J. An identity-based signature from gap DiffieHellman groups//Proceedings of the PKC 2003. Florida, USA, 2003:18- 30.
  • 6Waters R. Efficient identity based encryption without random oracles//Proceedings of the EUROCRYPT 2005. Aarhus, Denmark, 2005:114-127.
  • 7Paterson K, Schuldt J. Efficient identity based signatures secure in the standard model//Proceedings of the ACISP 2006. Melbourne, Australia, 2006:207-222.
  • 8Zheng Y. Digital signcryption or how to achieve cost (signature & encryption)<<cost(signature)+cost(encryption)// Proceedings of the CRYPTO 1997. California, USA, 1997: 165-179.
  • 9Malone-Lee J. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002.
  • 10Libert B, Quisquator J. A new identity based signcryption scheme from pairings//Proceedings of the 2003 IEEE Information Theory Workshop. Paris, France, 2003: 155-158.

共引文献44

同被引文献47

  • 1韩益亮,杨晓元.ECDSA可公开验证广义签密[J].计算机学报,2006,29(11):2003-2012. 被引量:30
  • 2Shamir A. Identity-based cryptosystems and signature schemes [C]///Proceeding of Crypto ' 84, LNCS196. Berlin: Springer-Ver- lag, 1984:47-53.
  • 3Boneh D, Frankklin M. Identity Based Encryption From the Weil Pairing[C] // Proceeding of Crypto' 01, LNCS21a9. Berlin.. Springer-Verlag, 2001 : 213-229.
  • 4Al-Riyami S S, Paterson K G. Certificateless public key cryptog- raphy [C]//Proceeding of ASIACRYPT 2003, LNCS2894. Ber- lin: Springer-Verlag, 2003 : 452-473.
  • 5Girault M. Self-certified public keys[C]//Proceeding of Euro- crypt ' 91, LNCS547. Berlin.. Springer-Verlatz, 1991 : 4 90-49 7.
  • 6Chen Xiao-feng, Zhang Fang-guo, Kim K. A New ID-based Group Signature Scheme from Bilinear Pairings [C]// Procee- dings of WISA'03. 2003:585-592.
  • 7Liao Jian, Xiao Jun-fang, Qi Ying-hao, et al. ID-based signature scheme without trusted PKG[C] // Proceeding of CISC 2005, LNCS3822. Berlin: Springer-Verlag, 2005 : 53-62.
  • 8Liu Jing-wei, Sun Rong, Kou Wei-dong, et al. Efficient ID-based Signature Without Trusted PKG[EB/OL]. http://eprint, iacr. org/2007/135,2007-04-17.
  • 9Zheng Yu-liang. Digital signcryption or how to achieve cost (sig- nature &- encryption)<<cost (signature) d-cost (encryption) [C] // Proceeding of Crypto' 97, LNCS1294. Berlin: Springer Verlag, 1997:165-179.
  • 10Han Yi-liang. Generalization of signcryption for resources-con- strained environments[J]. Wireless Communication and Mobile Computing, 2007,7 (7) : 919-931.

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部