期刊文献+

无证书签密机制的安全性分析 被引量:24

Security Analysis of a Certificateless Signcryption Scheme
在线阅读 下载PDF
导出
摘要 为了避免复杂的双线性对运算和提高签密机制的性能,Liu等人提出了一种不使用双线性对的无证书签密机制.同时,随机谕示模型下证明了机制是可证安全.通过给出具体的攻击算法,证明了Liu等人所提出的机制不能抵抗类型1敌手的攻击.为了抵抗这种攻击,给出了一种有效的方法. To avoid complicated pairing operation and improve performance, Liu, et al. proposed a pairing-free certificateless signcryption scheme, and claims that their scheme is provably secure in a strengthened security model. Unfortunately, by giving concrete attacks, the sutdy indicates that Liu's et al. certificateless signcryption scheme is not secure in this strengthened security model. To solve the problem, an efficient countermeasure is also proposed.
作者 何德彪
出处 《软件学报》 EI CSCD 北大核心 2013年第3期618-622,共5页 Journal of Software
基金 高等学校博士学科点专项科研基金(20110141120003)
关键词 签密 无证书 随机谕示模型 椭圆曲线 signcryption certificateless random oracle model elliptic curve
  • 相关文献

参考文献14

  • 1Shamir A. Identity-Based cryptosystem and signature scheme. In: Advances in Cryptology-Crypto'84. LNCS 196, Berlin: Springer-Verlag, 1984.47-53. Idol: 10.1007/3-540-39568-7_5].
  • 2AI-Riyami S, Paterson K. Certificateless public key cryptography. In: Laih CS, ed. Proc. of the lnt'l Association for Cryptdology Research 2003. LNCS 2894, Berlin: Springer-Verlag, 2003. 452-473. [doi: 10.1007/978-3-540-40061-5_29].
  • 3Zheng Y. Digital signcryption or how to achieve cost(signature & encryption)<<cost(signature)+cost(encryption). Advances in Cryptology-Crypto'97. LNCS 1294, Berlin: Springer-Verlag, 1997. 291-312. [doi: 10.1007/BFb0052234].
  • 4An J, Dodis Y, Rabin T. On the security of joint signature and encryption. In: Knudsen LR, ed. Proc. of the Eurocrypt 2002. LNCS 2332, Berlin: Springer-Verlag, 2002.83-107. Idol: 10.1007/3-540-46035-7_6].
  • 5Malone-Lee J. Identity based signcryption. Report, 2002/098, 2002. http://eprint.iacr.org/2002/098.
  • 6Barbosa M, Farshim P. Certificateless signcryption. In: Proc. of the ACM Symp. on Information, Computer and Communications Security (ASIACCS 2008). ACM Press, 2008. 369-372. [doi: 10.1145/1368310.1368364].
  • 7Aranha D, Castro R, Lopez J, Dahab R. Efficient certificateless signcryption. 2008. http://sbseg2008.inf.ufrgs.br/proceedings/data/ pdf/st03_ 01_ resumo.pdf.
  • 8Wu CH, Chen ZX. A new efficient eertificateless signcryption scheme. In: Proc. of the ISISE 2008. 2008. 661-664. [doi: I0.I 109/ ISISE.2008.206].
  • 9Sharmila DS, Vivek SS, Pandu RC. On the security of certificateless signcryption schemes. Report, 2009/298, 2009. http://eprint. iacr.org/2009/298.
  • 10Silva RR. Toward efficient certificateless signcryption from (and without) bilinear pairings. 2008. http://sbseg2008.inf.ufrgs.br/ proceedings/data/pdf/st03 _03 _artigo.pdf.

二级参考文献12

  • 1Zheng YL. Digital signcryption or how to achieve cost(signature & encryption)<<cost(signature)+cost(encryption). In: Jr Kaliski BS, ed. Proc. of the CRYPTO'97. LNCS 1294, Heidelberg: Springer-Verlag, 1997. 165-179. [doi: 10.1007/BFb0052234].
  • 2Al-Riyami SS, Paterson KG. Certificateless public key cryptography. In: Laih CS, ed. Proc. of the Advances in Cryptology-- Asiacrypt 2003. LNCS 2894, Heidelberg: Springer-Verlag, 2003.452-473. [doi: 10.1007/978,3-540-40061-5_29].
  • 3Barbosa M, Farshim P. Certificateless signcryption. In: Proc. of the ACM Symp. on Information, Computer and Communications Security (ASIACCS 2008). ACM, 2008. 369-372. Idol: 10.1145/1368310.1368364].
  • 4Aranha D, Castro R, Lopez J, Dahab R. Efficient certificateless signcryption. 2008. http://sbseg2008.inf.ufrgs.br/proceedings/data/ pdf/st03 01 resumo.pdf.
  • 5Wu CH, Chen ZX. A new efficient certificateless signcryption scheme. In: Proc. of the ISISE 2008. 2008.661-664. [doi: 10.1109/ ISISE.2008.206].
  • 6Sharmila DS, Vivek SS, Pandu RC. On the security of certificateless signcryption schemes. Cryptology ePrint Archive: Report 2009/298.2009. http://eprint.iacr.org/2009/298.
  • 7da Silva RR. Toward efficient certificateless signcryption from (and without) bilinear pairings. 2008. http://sbseg2008.inf.ufrgs.br/ proceedings/data/pdf/st03_03_artigo.pdf.
  • 8Li FG, Shirase M, Takagi T. Certificateless hybrid signcryption. In: Proc. of the ISPEC 2009. LNCS 5451, Berlin, Heidelberg: Springer-Verlag, 2009. 112-123. [doi: 10.1007/978-3-642-00843-6_11].
  • 9MIRACL. Multiprecision integer and rational arithmetic C/C++ Library. 2004. http://indigo.ie/mscott/.
  • 10Chert L, Cheng Z, Smart NP. Identity-Based key agreement protocols from pairings. Int'l Journal of Information Security, 2007, 6(4):213-241. [doi: 10.1007/s10207-006-0011-9].

共引文献58

同被引文献226

  • 1何大愚.智能电网发展历程中的问题、成效及其思考[J].中国电力,2012,45(8):37-40. 被引量:7
  • 2杨方,王文迪,葛旭波,张义斌.我国智能电网发展格局及综合评价[J].中国电力,2012,45(12):81-85. 被引量:22
  • 3冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:105
  • 4彭长根,李祥,罗文俊.一种面向群组通信的通用门限签密方案[J].电子学报,2007,35(1):64-67. 被引量:15
  • 5ZHENG Y. Signeryption and its application in efficient public key solutions [ C]// ISW'97: Proceedings of the First International Workshop on Information Security, LNCS 1396. Berlin: Springer- Verlag, 1997:291-312.
  • 6WANG C-T, CHANG C-C, LIN C-H. Generalization of threshold signature and authenticated encryption for group communication [ J]. IEICE Transactions on Fundamentals, 2000, E832A(6) : 1228 - 1237.
  • 7HSU C-L, WU T-S, WU T-C. Improvements of generalization of threshold signature and authenticated cncryption for group communi- cation [ J]. Information Processing Letters, 2002, 81(1) : 41 - 45.
  • 8WENG J, YAO G, DENG R H, et al. Cryptanalysis of a certificate- less signcryption scheme in the standard model [ J]. Information Sci- ence, 2011, 181(3): 661-667.
  • 9LIU Z, HU Y, ZHANG X, et al. Certificateless signcryption schemein the standard model [J]. Information Sciences, 2010, 180(3) : 452 -464.
  • 10FANG L, SUSILO W, GE C, et al. Hierarchical conditional proxy re-encryption [ J]. Computer Standards & Interfaces, 2012, 34(4) : 380 - 389.

引证文献24

二级引证文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部