期刊文献+

基于ECC的自认证广义指定验证者签密 被引量:2

Self-certified Universal Designated-Verifier Signcryption Based on Elliptic Curve Cryptosystem
下载PDF
导出
摘要 广义指定验证者签名允许签名的持有者指定签名给指定的验证者,但仅有指定的验证者能够验证这个签名,针对该问题,利用椭圆曲线密码体制(ECC)和自认证签密的特点,提出一个基于ECC的自认证广义指定验证者签密。该方案不仅消除了证书存在问题和密钥托管问题,而且具有算法复杂度低、处理速度快、存储空间占用小等特点,适合应用于电子投票、电子拍卖等领域。 Universal designated-verifier signature allows a signature holder to designate the signature to a desire designated-verifier,in such a way only the designated verifier can verify this signature.Using the merits of Elliptic Curve Cryptosystem(ECC) and self-certified signcryption,a new self-certified universal designated-verifier signcryption based on ECC is presented.The scheme eliminates certificate existence problem and key escrow problem.It has low algorithm complexity,quick proceeding speed and little storage space,so it is propitious to applications in E-vote and E-auction.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第16期124-125,共2页 Computer Engineering
基金 国家自然科学基金资助项目(60863006) 教育部科学技术研究基金资助重点项目(208148) 青海省科技厅软课题基金资助项目(2008-Z-620)
关键词 自认证签密 广义指定验证者签名 椭圆曲线密码体制 self-certified signcryption universal designated-verifier signature Elliptic Curve Cryptosystem(ECC)
  • 相关文献

参考文献6

二级参考文献26

  • 1耿莉,王尚平,周峰,燕召将.一种新的基于身份的签密方案[J].计算机工程,2004,30(19):52-54. 被引量:9
  • 2Zheng Yuliang. Digital Signcryption or How to Achieve Cost (Signature & Encryption) Cost(Signature)+Cost(Encryption)[C]// Proc. of Cryptology-CRYPYO'97. Berlin, Germany: Springer- Verlag, 1997. 被引量:1
  • 3He Weihua, Wu Tongchen. Cryptanalysis and Improvement of Petersen-michels Signcryption Scheme[J]. lEE Proceedings: Computers and Digital Technique, 1999, 146(2): 123-124. 被引量:1
  • 4Bao Feng, Deng R H, A Signcryption Scheme with SignatureDirectly Verifiable by Public Key[C]//Proc. of Cryptography- PKC'98, Berlin, Germany: Springer-Verlag, 1998. 被引量:1
  • 5Yum D H, Lee P J. New Signcryption Schemes Based on KCDSA[C]//Proc. of ICISC'01. Berlin, Germany: Springer-Verlag, 2001. 被引量:1
  • 6Jung H Y, Lee D H, Lira J I, et al. Signcryption Schemes with Forward Secrecy[C]//Proc. of WISA'01. Seoul, Korea: [s. n.], 2001. 被引量:1
  • 7Girault M. Self-certified Public Keys[C]//Proc. of Cryptology- EUROCRYPT'91. Berlin, Germany: Springer-Verlag, 1991. 被引量:1
  • 8[1]Koblitz N.Elliptic Curve Cryprosystems. Mathematics of Computation, 1987, 48:203-209 被引量:1
  • 9[2]Miller V S.Use of Elliptic Curves in Cryptography. Advances in Cryptology-CRYPTO'85, New York: Spring-Verlag, 1986, LNCS 218:417-426 被引量:1
  • 10[3]Robshaw M,Yin Y.Elliptic Curve Cryptosystems. An RSA Laboratories Technical Note, 1997-06 被引量:1

共引文献24

同被引文献26

  • 1LI Fagen,HU Yupu,LIU Shuanggen.Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings[J].Wuhan University Journal of Natural Sciences,2007,12(1):17-20. 被引量:5
  • 2Tzeng Z J, Tzeng W (3. Authentication of Mobile Users in Third Generation Mobile System[J]. Wireless Personal Communications, 2001, 16(1): 35-50. 被引量:1
  • 3Lee C C, Yang Chaochen, Hwang M S. A New Privacy and Authentication Protocol for End-to-end Mobile Users[J]. International Journal of Commmunication Systems, 2003, 16(9): 799-808. 被引量:1
  • 4Chang C C, Chen Kuolun, Hwang M S. End-to-end Security Protocol for Mobile Communications with End-user Identification/ Authentication[J]. Wireless Persona/Communications, 2004, 28(2) 95-106. 被引量:1
  • 5Zhu Jianming, Ma Jianfeng. A New Authentication Scheme with Anonymity for Wireless Environments[J]. IEEE Transactions on Consumer Electronics, 2004, 50(1): 231-235. 被引量:1
  • 6Lee C C, Hwang M S. Security Enhancement on a New Authentication Scheme with Anonymity for Wireless Environments[J]. IEEE Transactions on Industrial Electronics, 2006.53(5): 1683-1687. 被引量:1
  • 7Xu Jing, Zhu Wentao, Feng Dengguo. An Efficient Mutual Authentication and Key Agreement Protocol Preserving User Anonymity in Mobile Networks[J]. Computer Communications, 2011, 34(3): 319-325. 被引量:1
  • 8ZHENG Y L. Digital signcryption or how to achieve cost(signature & encryption) <C cost ( signature) + cost ( encryption)[C] // Proceedings of the 17th Annual International Cryptology Con-ference on Advances in Cryptology. Berlin: Springer, 1997: 165 -179. 被引量:1
  • 9BAEK J, STEINFELD R, ZHENG Y L. Formal proofs for the secur-ity of signcryption[ C] // Proceedings of the 5 th International Work-shop on Practice and Theory in Public Key Cryptosystems. Berlin:Springer-Verlag, 2002: 81 -98. 被引量:1
  • 10MALONE-LEE J. Identity-based signcryption[ EB/OL]. [2013-06-14]. http: //eprint. iacr. org/2002 /098. pdf. 被引量:1

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部