期刊文献+

密文匿名的高效前向安全短签密方案 被引量:5

Short Signcryption Scheme with Forward Security and Ciphertext Anonymity
原文传递
导出
摘要 提出了一个具有密文匿名性的前向安全的短签密方案,该方案可有效地保护密文收发方的身份隐私,并在随机预言机模型下证明了本方案具有语义安全性、不可伪造性、前向安全性、密文匿名性和公开验证性.在计算效率方面,签密过程只需要2个群标量乘运算,解密过程只需要2个双线性运算和1个群标量乘运算.与现有的短签密方案比较,新方案在安全性方面具有更强的安全性,且计算量小,密文长度短,更适合于带宽受限和签密收发双方身份保密的应用需求. A short signcryption scheme with ciphertext anonymity and forward security is proposed,which can protect the privacy of the sender and the receiver identities. The security models,including semantic security,unforgeability,ciphertext anonymity,forward security and verifiability,are analyzed in the random oracle models. In computational cost,the proposed scheme only need two scalar multiple operators in signcryption phase and two bilinear pairings and one scalar multiple operators in unsigncryption phase. Compared with the short signcryption schemes up to date,the computational costs of the new scheme are lower than those of signcryption schemes available where it has stronger security components,which can be used in the security requirement such as bandwidth constraint and identity hiding.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2010年第4期131-134,144,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60773175 60973134) 现代通信国家重点实验室基金项目(9140C1108020906) 广东省自然科学基金项目(9151064201000058)
关键词 短签密 密文匿名 前向安全 双线性映射 short signcryption ciphertext anonymity forward security bilinear pairings
  • 相关文献

参考文献11

  • 1Yang Guomin, Wong Duncan, Deng Xiaotie. Analysis and improvement of a signcryption scheme with key privacy[C]// ISC 2005, LNCS 3650. Berlin: Springer-Verlag, 2005: 218-232. 被引量:1
  • 2Chik How Tan. Analysis of improved signcryption scheme with key privacy [ J ]. Information Processing Letters, 2006, 99(4) : 135-138. 被引量:1
  • 3Ma Changshe. Efficient short signcryption scheme with public verifiability [ C ] //Inscrypt 2006. Beijing : [ s. n. ], 2006: 118-129. 被引量:1
  • 4Chik-How Tan. Forgery of provable secure short signcryption scheme [ J]. IEICE Transactions on Fundamentals, 2007, E90-A(9) : 1879-1880. 被引量:1
  • 5李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 6Chung Ki Li, Yang Guomin, Wong Duncan, et al. An efficient signcryption scheme with key privacy[ C]// EuroPKI 2007, LNCS 4582. Berlin: Springer-Verlag, 2007 : 78-93. 被引量:1
  • 7杜红珍,温巧燕.高效的短签密方案[J].北京邮电大学学报,2008,31(1):84-87. 被引量:11
  • 8Boneh D, Lynn B, Shacham H. Short signatures from the weil pairing [ J ]. Journal of Cryptology, 2004, 17 (4) :297-319. 被引量:1
  • 9Libert B, Quisquater J J. Efficient signcryption with key privacy form gap Diffie-Hellman group [ C ] //PKC04, LNCS2947. Berlin: Springer-Verlag, 2004: 187-200. 被引量:1
  • 10Dan Boneh, Xavier Boyen. Short signatures without random oracles and the SDH assumption in bilinear groups [J]. Journal of Cryptology, 2008, 21 : 149-177. 被引量:1

二级参考文献35

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 3顾纯祥,张亚娟,祝跃飞.混合可验证加密签名体制及应用[J].电子学报,2006,34(5):878-882. 被引量:8
  • 4Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179 被引量:1
  • 5Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81 被引量:1
  • 6Pang X. , Tan K. L. , Wang Y. , Ren J.. A secure agent-mediated payment protocol. In: Deng R. H. , Qing S. , Bao F. ,Zhou J. eds.. Information and Communications Security-ICICS 2002, Lecture Notes in Computer Science 2513. Berlin:Springer-Verlag, 2002, 422-433 被引量:1
  • 7Shamir A.. Identity-based cryptosystems and signature schemes. In: Blakley G. R. , Chaum D. eds.. Advances in Cryptology-CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984, 47-53 被引量:1
  • 8Boneh D. , Franklin M.. Identity-based encryption from the Weil pairing. In: Kilian J. ed.. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001, 213-229 被引量:1
  • 9Malone-Lee J.. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, IACR, 2002 被引量:1
  • 10Libert B. , Quisquater J.. A new identity based signcryption schemes from pairings. In: Proceeding of the 2003 IEEE Information Theory Workshop, Paris, France, 2003, 155-158 被引量:1

共引文献85

同被引文献28

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部