期刊文献+

新的基于身份的(t,n)门限签密方案

New ID-Based(t,n) Threshold Signcryption Scheme
下载PDF
导出
摘要 针对现有的门限签密方案效率低不太实用的不足,以及基于身份的签密系统密钥托管问题,利用双线性对提出了一个新的基于身份的(t,n)门限签密方案。通过引入签密者秘密信息,实现了密钥生成中心的不可诬陷性。与典型的基于身份的门限签密方案相比,效率更高,实用性更强。 Against the shortage of low efficiency of the existing threshold signcryption scheme and the key escrow in the id-based cryptosystem,a new identity-based(t,n) threshold signature encryption scheme is proposed from bilinear pairings.Our scheme can resist the private key generator to entrap through the introduction of secret information of the signcryptioner.Our scheme is more efficient and practical than the existing scheme.
出处 《计算机系统应用》 2011年第4期55-58,共4页 Computer Systems & Applications
关键词 基于身份 密钥托管 门限签密 双线性对 ID-based key escrow threshold signcryption bilinear pairings
  • 相关文献

参考文献10

  • 1Zheng Y. Digital signcryption or how to achieve cost (Signature&Encryption)<<Cost(Signature)+Cost(Encryption)Crypto'971 Berlin: Springer, 1997. 165-179. 被引量:1
  • 2Zheng Y. Signcryption and its applications in efficient public key solution. ISW'97. LNCS 1397, Springer-Verlag, 1998: 291-312. 被引量:1
  • 3Shamir A. Identity-based cryptosystems and signature schemes. Advances in Cryptology-Crypto'84, LNCS 196, New York: Springer-Verlag, 1984. 47-53. 被引量:1
  • 4Duan S, Cao Z, Lu R. Robust ID-based threshold signcryption scheme from pairings. 3rd International Conference on Information Security. Shanghai, China, 2004. 33-37. 被引量:1
  • 5Li FG, Yu Y. Click on a pin to ref'me search results Reset Map Center and Zoom An efficient and Provably Secure ID- Based Threshold Signcryption Scheme. 2008 International Conference on Communications, Circuits and Systems Proceedings ICCCAS 2008. Xiamen, Fujian Province, China, 2008. 488-492. 被引量:1
  • 6Selvi SS, Vivek SS, Rangan CP, Jain N. Cryptanalysis ofLi et al.'s identity-based threshold signcryption scheme. Proc. of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Shanghai, China, 2008. 127- 132. 被引量:1
  • 7Boneh D, Franklin M. Identity-based encryption from the Weil pairing. Advances in Cryptology- Crypro'2001, Berlin: Springer-Verlag, 2001. 213 - 229. 被引量:1
  • 8Baek J, Zheng Y. Identity-based threshold signature scheme from the bilinear pairings. International Conference on Information Technology: Coding and Computing-ITCC'04, LasVegas. Nevada, USA, 2004. 124-128. 被引量:1
  • 9彭华熹,冯登国.一个基于双线性映射的前向安全门限签名方案[J].计算机研究与发展,2007,44(4):574-580. 被引量:13
  • 10Peng C, Li X. An identity-based threshold signcryption scheme with semantic security. Computational Intelligence and Security-CIS 2005. Xi'an, China. 173-179. 被引量:1

二级参考文献11

  • 1马春波,何大可.基于双线性映射的卡梅隆门限签名方案[J].计算机研究与发展,2005,42(8):1427-1430. 被引量:8
  • 2D L Vo,F Zhang,K Kim.A new threshold blind signature scheme from pairings[C].In:SCIS2003.New York:ACM Press,2003.26-29 被引量:1
  • 3J Baek,Y Zheng.Identity-based threshold signature scheme from the bilinear pairings[C].In:IAS'04 Track of ITCC'04.Los Alamitos:IEEE Computer Society Press,2004.124-128 被引量:1
  • 4F Hess.Efficient identity based signature schemes based on pairings[G].In:Selected Areas in Cryptography(SAC 2002),Lecture Notes in Computer Science 2595.Berlin:Springer-Verlag,2002.310-324 被引量:1
  • 5R Ostrovsky,M Yung.How to withstand mobile virus attacks[C].The 10th Annual Symp on Principles of Distributed Computing (PODC'91),Montreal,Quebec,Canada,1991 被引量:1
  • 6A Shamir.Identity-based cryptosystems and signature schemes[G].In:Advances in Cryptology-Crypto' 84,LNCS 196.Berlin:Springer-Verlag,1984.47-53 被引量:1
  • 7R Canetti,S Halevi,J Katz.A forward-secure public-key encryption scheme[G].In:Advances in Cryptology-Eurocrypt '03,LNCS 2656.Berlin:Springer-Verlay,2003.255-271 被引量:1
  • 8F Hu,C-H Wu,J D Irwin.A new forward secure signature scheme using bilinear maps[R].Cryptology ePrint Archive,Tech Rep:2003/188,2003 被引量:1
  • 9Y Dodis,M Franklin,J Katz,et al.Intrusion resilient publickey encryption[G].In:Topics in Cryptology CT-RSA 2003,Lecture Notes in Computer Science 2612.Berlin:Springer-Verlag,2003.19-32 被引量:1
  • 10C Gentry,A Silverberg.Hierarchical ID-based cryptography[G].In:Advances in Cryptology-Asiacrypt 2002,Lecture Notes in Computer Science 2501.Berlin:Springer-Verlag,2002.548-566 被引量:1

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部