期刊文献+

一种无证书前向安全代理签密方案 被引量:2

An Certificateless Forward Secure Proxy Signcryption Scheme
在线阅读 下载PDF
导出
摘要 基于离散对数问题提出一个无证书前向安全代理签密方案,和其他相似方案相比,本方案克服基于身份密码体制中的密钥托管问题和PKI密码体制中的证书存在问题,不仅具有不可伪造性、不可否认性、强可识别性和密钥的依赖性等共有性质,同时具有前向安全性、健壮性和真正的可公开验证性等特殊性质:即使签密当前阶段的代理密钥泄漏,攻击者也不能伪造之前的合法签密. A forward secure certificateless proxy signcryption based on the difficulty of solving discrete logarithm problem is proposed by use of the forward secure characteristic. Compared to other similar scheme, this scheme can avoid the escrow-key in the ID-based cryptosystem and can avoid using certificate in PKI-based cryptosystem. It not only includes some common characteristic such as unforgeability, undeniability, strong distinguishability, the proxy key's dependence to the primary secret key. Also, it includes some special characteristic: forward secure, robustness, public verifiability- even the proxy secret key has been stolen, the attacker could not forge the former proxy signcryption. Moreover, the correctness of the signcryption can be proved without the participation of the unsigncryptor.
出处 《淮北师范大学学报(自然科学版)》 CAS 2011年第4期44-48,共5页 Journal of Huaibei Normal University:Natural Sciences
基金 安徽省教育厅自然科学一般项目(KJ2010B059) 安徽科技学院安徽省自然科学基金预研项目(ZRC2011274)
关键词 离散对数 无证书签密 不可伪造性 可公开验证性 健壮性 DLP certificateless signcryption unforgeability verifiability robustness
  • 相关文献

参考文献8

  • 1GAMAGE C,LEIWO J,ZHENG Y.An efficient scheme for secure message transmission using proxy signcryption. Proceedingsof 22nd Australasian Computer Science Conference . 1999
  • 2Anderson R.Invited Lecture. Proceedings of the 4th ACM Conference on Computer and Communications Security . 1997
  • 3杨萱,余昭平.一个高效的基于身份的代理签密方案[J].计算机工程,2009,35(2):170-171. 被引量:6
  • 4Lee YR,Lee HS.An authenticated certificateless public key encryption scheme. Trends in Mathematics Information Center for Mathematical Sciences . 2005
  • 5Chan WK,Wei VK.Athreshold proxy signcryption. Proceedings of the 2002 International Conference on Security and Management (SAM2002) . 2002
  • 6LI Xianxue,CHEN Kefei.Identity-based proxy-signature scheme from pairings. Proceedings of SCC’’04 . 2004
  • 7于刚,黄根勋.一个前向安全的基于身份的代理签密方案[J].计算机工程与应用,2008,44(2):157-159. 被引量:8
  • 8王会歌,王彩芬,李泳斌,杨小东.没有pairing的无证书公钥签名方案[J].计算机应用,2008,28(6):1395-1397. 被引量:14

二级参考文献27

  • 1张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 2YANG Chen MA Wen-ping WANG Xin-mei.Secure mediated certificateless signature scheme[J].The Journal of China Universities of Posts and Telecommunications,2007,14(2):75-78. 被引量:4
  • 3Shamir A. Identity-based Cryptosystems and Signature Schemes[C]// Proc. of CRYPTO'84. Berlin, Germany: Springer-Verlag, 1984.
  • 4Boneh D, Franklin M. Identity-based Encryption from the WeilPairing[C]//Proc. of CRYPTO'01. Berlin, Germany: Springer- Verlag, 2001.
  • 5Mambo M, Usuda K, Okamoto E. Proxy Signatures: Delegation of the Power to Sign Messages[J]. IEICE Trans. on Fundam, 1996, E79-A(9): 1338-1354.
  • 6Lee B, Kim H, Kim K. Strong Proxy Signature and Its Application[C]//Proceedings of SCIS'01. Oiso, Japan: [s. n.], 2001.
  • 7Gamage C, Leiwo J, Zheng Yuliang. An Efficient Scheme for Secure Message Transmission Using Proxy-signcryption[C]//Proc. of the 22th Australasian Computer Science. [S. l.]: Springer-Verlag, 1999.
  • 8Li Xiangxue, Chen Kefei. Identity-based Proxy-signcryption Scheme from Pairings[C]//Proceedings of SCC'04. Los Alamitos, USA: IEEE Computer Society Press, 2004: 494-497.
  • 9Wang Meng, Li Hui, Liu Zhijing. Efficient Identity-based Proxysigncryption Schemes with Forward Security and Public Verifiability[C]//Proc. of the 3rd International Conference on Networking and Mobile Computing. [S. l.]: Springer-Verlag, 2005.
  • 10Duan Shanshan, Cao Zhenfu, Zhou Yuan. Secure Delegation-by- warrant ID-based Proxy Signcryption Scheme[C]//Proc. of CIS'05. [S.l.]: Springer-Verlag, 2005.

共引文献24

同被引文献27

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部