期刊文献+

一种基于身份的广播签密方案 被引量:4

An ID-based Broadcast Signcryption Scheme
在线阅读 下载PDF
导出
摘要 为了使保密信息能够通过不安全的广播信道安全地发送给已授权接收的用户集,对Selvi IBBSC方案进行研究,提出了一个改进的基于身份的广播签密方案。方案建立基于身份的广播签密方案构架,利用椭圆曲线上的双线性对,形成了具有安全性和高效性的广播签密方案。先分析了方案的正确性,然后基于判定双线性Diffie-Hell-man假定在随机预言模型下分析了密文的不可区分性以及基于计算性Diffie-Hellman假定分析了签名的不可伪造性,最后简要分析了方案的有效性。结果表明,提出的方案能够对保密和认证的双重问题提供有效处理,具有较强的安全性,能够有效地提高广播网络应用环境的安全性;并且方案减少了部分广播参数,解签密计算时间花费相对较少,具有高效性。 In order to securely transmit the privacy information to authorized users' set through the unsafe channel,an identity-based broadcast signcryption scheme(IBSC) based on Selvi IBBSC scheme was proposed.In the IBSC,the ID-based signcryption scheme for broadcast communication' schema was put up,and using bilinear pairing on elliptic curves,a new secure,efficiently identity-based broadcast signcryption scheme was proposed.Firstly the correction was analyzed,and then signcryption schemes were proven to be secure against adaptive chosen ciphertext attacks and adaptive chosen message attacks under decisional bilinear Diffie-Hellman assumption and computational Diffie-Hellman assumption respectively.Lastly the efficiency of IBSC was analyzed simply.The results showed that the proposed scheme,which provids the efficient solution to the dual problem of confidentiality and authentication,is secure in the random oracle model and could efficiently improve the security of Broadcast network,and more efficient in reducing the broadcasting parameter and the computing consumption of Designcypt.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2012年第1期118-122,共5页 Journal of Sichuan University (Engineering Science Edition)
基金 国家重点基础研究发展规划资助项目(2011CB302903) 国家自然科学基金资助项目(6107318860873231) 中国博士后科学基金资助项目(20100471355) 江苏高校优势学科建设工程资助项目(yx002001)
关键词 基于身份的密码体制 签密 双线性对 广播 identity-based cryptography signcryption bilinear pairing broadcast
  • 相关文献

参考文献15

  • 1Shamir A. Identity-based cryptosystem and signature schemes [ C ]//Proceedings of CRYFrO' 84 on Advances in Cryptology. Springer,1985 ,LNCS 196:47 -53.
  • 2Boneh D, Franklin M. Identity based encryption from the Weil pairing [ J ]. SIAM Journal on Computing, 2003,32 (3) :586-615.
  • 3Bellare M, Waters B, Scott Y. Identity-based encryption secure against selective opening attack [ C]//th'oceedings of TCC 2011. 2011:235 -252.
  • 4Icart T. How to hash into elliptic curves [ C ]//Advances in Cryptology--CRYPTO 2009. Berlin, Germany: Springer, 2009, LNCS 5677:303-316.
  • 5杜红珍,温巧燕.一个高效的基于身份的聚合签名方案[J].四川大学学报(工程科学版),2011,43(1):87-90. 被引量:7
  • 6Zheng Y L. Digital signcryption or how to achieve cost ( signature & encryption) 《:cost (signature) + cost ( encryption) [ C]//Proceedings of CRYPTO 1997. 1997, LNCS 1294:165-1.79.
  • 7Malone-Lee J. Identity-based signcryption [ EB/OL ]. http :// eprint, iacr. org/2002/098.
  • 8Barreto P S L M,Libert B,McCullagh N,et al. Efficient and provably secure identity-based signatures and signcryption from bilinear maps [ C ]//Proceedings of ASIACRYPT. Chennai, India,2005, LNCS 3788:515-532.
  • 9Selvi S S D, Vivek S S, Jain N, et al. Cryptanalysis of Li et al. 's identity-based threshold signcryption scheme [ C ]// Proceedings of Embedded and Ubiquitous Computing( EUC' 08). IEEE/IFIP International Conference on,2008,2 : 127-132.
  • 10祁正华,杨庚,任勋益,王卉.基于ABE-IBS的无线传感器网络签名加密一体化方法[J].通信学报,2010,31(4):37-44. 被引量:4

二级参考文献27

  • 1Liang-liangXiao,Mu-lanLiu.Linear Secret Sharing Schemes and Rearrangements of Access Structures[J].Acta Mathematicae Applicatae Sinica,2004,20(4):685-694. 被引量:6
  • 2Boneh D, Gentry C, Lynn B, et al. Aggregate and verifiably encrypted signatures from bilinear maps [ C]//Advanees in Cryptology-Eurocrypt 2003. LNCS 2656, Springer-Verlag, 2003:416 - 432.
  • 3Xu Jing, Zhang Zhenfeng, Feng Dengguo. ID-based aggregate signatures from bilinear pairings [ C ]//Proceedings of CANS 2005. LNCS 3810, Springer-Verlag,2005 : 110 - 119.
  • 4Gentry C, Ramzan Z. Identity-based aggregate signatures [ C ]//Proceedings of PKC 2006. LNCS 3958,2006 : 257 - 273.
  • 5Song J, Kim H, Lee S, et al. Security enhancement in Ad Hoc network with ID-based cryptosystem [ C ]//Proceedings of ICACT 2005. 2005:572 -376.
  • 6Bellare M, Namprempre C, Neven G. Unrestricted aggregate signatures [ C ]//Proceedings of ICALP 2007. LNCS 4596, Springer-Verlag, 2007 :411 - 422.
  • 7Li J, Kim K, Zhang F, et al. Aggregate proxy signature and verifiably encrypted proxy signature [ C ]//Proceedings of ProvSec 2007. LNCS 4784, Springer-Verlag, 2007:208 - 217.
  • 8Cheng X, Liu J, Wang X. Identity-based aggregate and verifiably encrypted signatures from bilinear pairing [ C ]//Proceedings of ICCSA 2005. LNCS 3483, Springer-Verlag, 2005 : 1 046 - 1 054.
  • 9Wang Zhu, Chen Huiyan, Ye Dingfeng, et al. Practical identity-based aggregate signature scheme from bilinear maps [ J ]. Journal of Shanghai Jiaotong University: English Edition, 2008,13 (6) :684 - 687.
  • 10Wen Yiling, Ma Jianfeng. An aggregate signature scheme with constant pairing operations [ C ]//Proceedings of CSSE. IEEE Computer Society ,2008 ( 3 ) :830 - 833.

共引文献12

同被引文献34

  • 1王标,方颖珏,林宏刚,李轶.基于环Z_n上圆锥曲线的QV签名方案[J].中国科学(F辑:信息科学),2009,39(2):212-217. 被引量:3
  • 2孙琦,朱文余,王标.环Z_n上圆锥曲线和公钥密码协议[J].四川大学学报(自然科学版),2005,42(3):471-478. 被引量:44
  • 3李航宇.有限域上的圆锥曲线的数乘运算(英文)[J].信息安全与通信保密,2007,29(8):64-65. 被引量:5
  • 4Fiat A,Naor M.Broadcast encryption[C]//Proceedings ofthe 13th annual international cryptology.New York:Spring-er-Verlag,1993:480-491.
  • 5Barbosa M,Farshim P.Efficient identity-based key encapsu-lation to multiple parties[C]//Proceedings of the 10th IMAInternational Conference on Cryptography and Coding.Ciren-cester,UK,2005,LNCS 3796:428-441.
  • 6Delerablee C,Paillier P.Fully collusion secure dynamicbroadcast encryption with constant-size ciphertexts or de-cryption keys[C]//Proceedings of the first InternationalConference on Pairing-based Cryptography.Tokyo,Japan,2007:39-59.
  • 7ZhanL Y,Hu Y P,Mu N B.An Identity-based broadcast en-cryption protocol for ad hoc networks[C].The 9th Interna-tional Conference for Young Computer Scientists,2009:1619-1623.
  • 8ZhengY L.Digital signcryption or how to achieve cost( sig-nature & encryption) C cost ( signature) + cost ( encryp-tion)[C]//Advances in Cryptology-CRYPTO 1997.Ber-lin:Springer-verlag,1997,LNCS 1294:165-179.
  • 9Baek J,Steinfeld R,Zheng Y,Formal proofs for the securityof signcryption[C]//Naccache D,Paillier P.PKC 2002.Heidelberg:Springer,2002,LNCS 2274:80-98.
  • 10Malone-Lee J.Identity-based signcryption[EB/OL].Cryp-tology ePrint Archive,Report 2002/098,http://eprint.iacr.org/2002/098.

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部