期刊文献+

标准模型下高效安全的基于身份多签密方案 被引量:4

Efficient and secure identity-based multi-signcryption scheme in standard model
在线阅读 下载PDF
导出
摘要 针对已提出的基于身份多签密方案效率不高的问题,提出了一种高效安全的基于身份多签密方案。新方案消除了多次乘法运算,增加了密钥验证过程,并在标准模型下进行安全性分析及效率分析,证明了新方案可归约于CDH困难假定,计算量减少。与现有方案相比,新方案的安全性和多签密效率都得到了提高。 Faced with the inefficiency problem of current identity-based multi-signcryption schemes,an efficient and secure identity-based multi-signcryption scheme was proposed.The new scheme eliminated the number of multiplicative operations,and increased the procedure of key verification.Furthermore,through security and efficiency analysis in the standard model,the new scheme is proved secure under computational Diffie-Hellman assumption and reduces the calculation work.Compared with the known schemes,the new scheme is more secure and efficient.
出处 《计算机应用》 CSCD 北大核心 2012年第4期957-959,共3页 journal of Computer Applications
基金 中国科学院自动化研究所复杂系统与智能科学重点实验室开放课题基金资助项目(20070101) 辽宁省教育厅高等学校科学研究基金资助项目(2008334)
关键词 多签密 基于身份 标准模型 双线性对 可证安全 multi-signcryption identity-based standard model bilinear pairing provable security
  • 相关文献

参考文献12

  • 1SHAMIR A.Identity-based cryptosystems and signature schemes[C]//Proceedings of CRYPTO'84 on Advances in Cryptology.New York:Springer-Verlag,1984:47-53.
  • 2BONEH D,BOVEN X.Secure identity-based encryption withoutrandom oracles[C]//Advances in Cryptology—CRYPTO'04.Ber-lin:Springer-Verlag,2004:443-459.
  • 3ZHENG Y.Digital signcryption or how to achieve cost(signature&en-cryption)<.
  • 4MALONE-LEE J.Identity-based signcryption[R].Cryptology ePrintArchive,Report 2002/098,2002.[2011-10-01].http://eprint.iacr.org/2002/098.pdf.
  • 5CHOW S,YIU S,HUI L,et al.Efficient forward and provably secureID-based signcryption scheme with public verifiability and public ci-phertext authenticity[EB/OL].[2011-07-01].http://www.springerlink.com/index/8r0537akfply3697.pdf.
  • 6YU Y,YANG B,SUN Y,et al.Identity-based signcryption schemewithout random oracles[J].Computer Standards&Interfaces,2009,31(1):56-62.
  • 7MITOMI S,MIYAJI A.A general model of multi-signature schemeswith message flexibility,order flexibility and order verifiability[J].IEICE Transactions on Fundamentals,2001,E84-A(10):2488-2499.
  • 8张波,徐秋亮.无随机预言机的基于身份多签密方案(英文)[J].计算机学报,2010,33(1):103-110. 被引量:16
  • 9谷科,贾维嘉,姜春林.高效安全的基于身份的签名方案[J].软件学报,2011,22(6):1350-1360. 被引量:17
  • 10李继国,姜平进.标准模型下可证安全的基于身份的高效签名方案[J].计算机学报,2009,32(11):2130-2136. 被引量:43

二级参考文献30

共引文献62

同被引文献44

  • 1肖德琴,冯健昭,杨波,张焕国.基于无线传感器网络的信誉形式化模型[J].计算机科学,2007,34(6):84-87. 被引量:11
  • 2Shamir A. Identity-based Cryptosystems and Signature Schemes[C]//Proceedings of CRYPTO'84. Berlin, Germany: Springer-Verlag, 1985: 47-53.
  • 3Boneh D, Franklin M. Identity-based Encryption from the Well Pairing[C]//Proeeedings of CRYPTO'0I. Berlin, Germany: Springer-Verlag, 2001: 213 -229.
  • 4Boneh D, Boyen X. Efficient Selective-ID Secure Identity-based Encryption Without Random Oracles[C]//Proceedings of EUROCRYPT'04. Berlin, Germany: Springer-Verlag, 2004: 223-238.
  • 5Waters B. Efficient Identity-based Encryption Without Random Oracles[C]//Proceedings of EUROCRYPT'05. Berlin, Germany: Springer-Verlag, 2005:114-127.
  • 6Paterson K, Schuldt J. Efficient Identity-based Signatures Secure in the Standard Model[C]//Proceedings of ACISP'06. Berlin, Germany: Springer-Verlag, 2006: 207-222.
  • 7SHAMIR A. Identity-based cryptosystems and signature schemes [ C]// Proceedings of the 4th Annual International Cryptology Con- ference, LNCS 196. Berlin: Springer-Verlag, 1985:47-53.
  • 8BONEH D, FRANKLIN M. Identity-based eneryption from the Weil pairing [ C]//Proceedings of the 21 st Annual International Cryptolo- gv Conference, LNCS2139. Berlin: Springer-Verlag, 2001: 213-229.
  • 9BONEH D, BOYEN X. Efficient selective-id secure identity-based encryption without random oracles [ C]//Proceedings of Internation- al Conference on the Theory and Applications of Cryptographic Tech- niques 2004, LNCS 3027. Berlin: Springer-Verlag, 2004: 223- 238.
  • 10WATERS B. Efficient identity-based eneryption without random ora- cles [ C]// Proceedings of International Conference on the Theory and Applications of Cryptographie Techniques 2005, LNCS 3494. Berlin: Springer-Verlag, 2005:114 - 127.

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部