期刊文献+

对一个匿名多接收者签密方案的安全性分析与改进 被引量:6

Security Analysis and Improvement of an Anonymous Multi-Receiver Signcryption Scheme
在线阅读 下载PDF
导出
摘要 2011年,庞等人利用拉格朗日插值多项式方法构造了一个新的基于身份的多接收者匿名签密方案,并声称在其方案中任何攻击者或合法接收者都无法获取其他合法接收者的身份信息,从而能够保护接收者隐私.本文对庞等人的多接收者签密方案进行安全性分析,发现其方案中任何接收者对于其他接收者都无法实现匿名.同时,本文在其方案基础上进行改进,提出了一种改进方案,以弥补其安全缺陷.最后在随机预言模型下,对改进方案的正确性和接收者匿名性进行了证明. In 2011,Pang et al proposed a newmulti-receiver ID-based anonymous signcryption scheme by using Lagrange interpolating polynomial. They announced that their scheme makes it impossible for an attacker or any other message receivers to derive the identity of a message receiver such that the privacy of each receiver can be guaranteed. In this work,we studied the security of Pang et al's anonymous multi-receiver signcryption scheme. It is regretful that we found a receiver is not really anonymous to any other receivers in Pang et al's scheme. In order to solve this security defect,an improved scheme was proposed. Finally,the improved scheme was proved to satisfy the correctness and receiver anonymity in the random oracle model.
出处 《电子学报》 EI CAS CSCD 北大核心 2015年第11期2187-2193,共7页 Acta Electronica Sinica
基金 国家自然科学基金(No.61103178) 中央高校基本科研业务费专项资金(No.3102015JSJ0003) 陕西省自然科学基础研究计划资助项目(No.2015JM6294)
关键词 多接收者签密 匿名性 基于身份的签密 拉格朗日插值 multi-receiver signcryption anonymity identity-based signcryption Lagrange interpolating
  • 相关文献

参考文献12

  • 1Duan S S,Cao Z F.Efficient and provably secure multi receiver identity based signcryption. 2006 11th Australasian Conference on Information Security and Privacy(ACISP'06)[C]. Berlin:Springer,2006.195-206.
  • 2Yu Y,Yang B,Huang X Y,et al.Efficient identity-based signcryption scheme for multiple receivers. 20017 4th International Conference on Autonomic and Trusted Computing(ATC'07)[C]. Berlin:Springer,2007.13-21.
  • 3Selvi S S D,Vivek S S,Shukla D,et al.Efficient and provably secure certi? cateless multi-receiver signcryption. 2008 2nd International Conference on Provable Security[C]. Berlin:Springer,2008.52-67.
  • 4Selvi S S D,Vivek S S,Srinivasan R,et al.An efficient identity-based signcryption scheme for multiple receivers. 2009 4th International Workshop on Security(IWSEC'09)[C]. Berlin:Springer,2009.71-88.
  • 5PANG Liaojun,GAO Lu,PEI Qingqi,GUI Jingjing,WANG Yumin.A New ID-based Multi-Recipient Public-key Encryption Scheme[J].Chinese Journal of Electronics,2013,22(1):89-92. 被引量:1
  • 6Zhang J H,Mao J.A novel identity-based multi-signcryption scheme[J]. Computer Communications,2009,32(1):14-18.
  • 7Lal S,Kushwah P.Anonymous ID based signcryption scheme for multiple receivers[DB/OL]. Cryptology ePrint Archive,Report 2009/345,http://eprint.iacr.org/2009/345.
  • 8Elkamchouchi H,Abouelseoud Y.MIDSCYK:An efficient provably secure multirecipient identity-based signcryption scheme. 2009 International Conference on Networking and Media Convergence[C]. Piscataway:IEEE Press,2009.70-75.
  • 9Zhang B,Xu Q.An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model. 2010 2nd Int Conf on Adv Sci and Technol/4th Int Conf on Informat Security and Assurance/2nd Int Conf on Adv Commun and Networking/Int Conf on Ubiquitous Computing and Multimedia[C]. Berlin:Springer,2010.15-27.
  • 10Wang H,Zhang Y,Qin B.Analysis and improvements of two identity based anonymous signcryption schemes for multiple receivers. 2012 IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications[C]. Los Alamitos,CA,USA:IEEE computer Society,2012.1057-1062.

二级参考文献17

  • 1Duan S, Cao Z. Efficient and provably secure multi receiver identity based signcryption//Proceedings of the Information Security and Privacy llth Australasian Conference. Mel- bourne, Australia, 2006:195-206.
  • 2Lal S, Kushwah P. Anonymous ID based signcryption scheme for multiple receivers. Cryptology ePrint Archive.. Report 2009/345.
  • 3Yu Y, Yang B, Huang X, Zhang M. Efficient identity-based signcryption scheme for multiple receivers//Proceedings of the Autonomic and Trusted Computing 4th International Conference. Hong Kong, China, 2007: 13-21.
  • 4Sharmila S, Sree S, Srinivasan R, Pandu C. An efficient identity-based signcryption scheme for multiple receivers// Proceedings of the Advances in Information and Computer Security 4th International Workshop on Security. Toyama, Japan, 2009:71-88.
  • 5Elkamehouehi H, Abouelseoud Y. MIDSCYK.. An efficient provably secure multirecipient identity-based signcryption scheme//Proceedings of the International Conference on Net working and Media Convergence. Cairo, Egypt, 2009:70-75.
  • 6Qin H, Dai Y, Wang Z. Identity-based multi-receiver threshold signcryption scheme. Security and Co:xxmunieation Networks, 2010, 3(6): 535-545.
  • 7Miao S, Zhang F, Zhang L. Cryptanalysis of a certificateless multi-receiver signcryption scheme//Proceedings of the 2010 International Conference on Multimedia Information Networ- king and Security. Nanjing, China, 2010: 593-597.
  • 8Zheng Y. Digital signcryption or how to achieve cost (signa- ture &encryption) <<cost (signature) + cost (encryption)// Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology. London, UK, 1997: 165-179.
  • 9Malone-Lee J. Identity-based signcryption. Cryptology ePrint Arehive: Report 2002/098.
  • 10Rivest R, Shamir A, Tauman Y. How to leak a secret: Theory and applications of ring signatures//Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. London, UK, 2001:552-565.

共引文献13

同被引文献33

引证文献6

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部