期刊文献+

具有撤销功能的基于身份的签密方案

Identity-based signcryption with the revocation function
下载PDF
导出
摘要 为了有效解决签密系统中撤销用户的问题,提出了具有撤销功能的基于身份的签密方案。方案将主密钥随机分布在初始密钥和更新密钥中,再随机生成签密密钥,从而不仅能有效撤销用户,而且能抵抗密钥泄露攻击。在标准模型下,证明了该方案基于DBDH问题假设,具有不可区分性;基于CDH问题假设,具有不可伪造性。同时,任何第三方在不访问明文的情况下,均可验证签密密文。 An identity-based signcryption scheme with revocation is proposed in order to solve the problem of revoking users in the signcryption system. In this scheme,the master key is randomly distributed in the initial key and update key,which are used to generate the signcryption key randomly. Thus,the proposed scheme can revoke users effectively as well as resist key compromise attack. In the standard model,the scheme is proven to be indistinguishable and unforgettable against adaptive chosen ciphertext attacks and adaptive chosen message attacks under decisional bilinear Diffie-Hellman assumption and computational Diffie-Hellman assumption,respectively. Furthermore,any third party can verify the ciphertext without accessing plaintext.
出处 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2015年第6期856-860,共5页 Journal of Harbin Engineering University
基金 国家自然科学基金资助项目(61472470 61100229) 陕西省自然科学基金资助项目(2014JM2-6091 2015JQ1007) 广西信息科学实验中心经费资助(20130201)
关键词 签密 密钥泄露 撤销 可证明安全 公开可验证 signcryption key compromise revocation provable security public ciphertext verifiability
  • 相关文献

参考文献11

  • 1ZHENG Y L. Digital signcryption or how to achieve cost( sig- nature and encryption) << cost(signature) + cost( encryp- tion) [ C ]//Advances inCryptology--CRYPTO' 97. Berlin : Springer, 1997: 165-179. 被引量:1
  • 2GOYAL V. Certificate revocation using fine grained certifi- cate space partitioning[ C ]//Financia Cryptography and Da- ta Security.Berlin: Springer, 2007: 247-259. 被引量:1
  • 3BONEH D, FRANKLIN M. Identity-based encryption from the weil pairing [ C ]//Advances in Cryptology-CRYPTO 2001. Berlin: Springer, 2001: 213-229. 被引量:1
  • 4BOLDREVA A, GOYAL V, KUMER V. Identity-based en- cryption with efficient revocation [ C ]//Proceedings of the 15th ACM Conference on Computer and Communications Se- curity. Berlin: Springer, 2008: 417-426. 被引量:1
  • 5LIBERT B, VERGNAUD D. Adaptive-ID secure revocable identity-based encryption [ C ]//Topics in Cryptology-CT- RSA2009. Berlin: Springer, 2009 : 1-15. 被引量:1
  • 6SEO J H, EMURA K. Efficient delegation of keygeneration and revocation functionalities in identity-based encryption [ C]//Topics in Cryptology-CTRSA 2013. Berlin: Spring- er, 2013: 343-358. 被引量:1
  • 7SEO J H, EMURA K. Revocable identity-based eneryption revisited : security model and construction [ C ]//Public-Key Crvptograohv-PKG2013. Bedin:Soringer, 2013: 216-234. 被引量:1
  • 8锁琰,李晓辉,徐小岩,张毓森.一种安全的分布式群签名方案[J].哈尔滨工程大学学报,2011,32(12):1594-1598. 被引量:3
  • 9TSAI T T, TSENG Y M, WU T Y. Provably secure revoca- ble ID-based signature in the standard model [ J ]. Security and Communication Networks, 2013, 6(6) : 669-796. 被引量:1
  • 10WU T Y, TSAI T T, TSENG Y M. A revocable ID-based signcryption scheme [ J ]. Information Hiding and Multi- media Signal Processing, 2012, 3(3): 240-251. 被引量:1

二级参考文献13

  • 1CHAUM D, VAN H E. Group signature [ C ]//Advances in Cryptology-Eurocrypt1991. Berlin: Springer-Verlag, 1991 : 257-265. 被引量:1
  • 2BOYEN X, WATERS B. Compact group signatures without random oracles [ C ]//Advances in Cryptology- Eurocrypt' 2006. Berlin: Spring-Verlag, 2006:427 444. 被引量:1
  • 3SONG X D. Practical forward secure group signature schemes[ C]//Proceedings of the 8th ACM Conference on Computer and Communications Security. Philadelphia: ACM Press, 2001: 225-234. 被引量:1
  • 4LIBERT B, YUNG M. Dynamic fully forward-secure group signatures[ C ]//Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. Bei- jing: ACM Press, 2010: 70-81. 被引量:1
  • 5BURMESTER M, CHRISSIKOPOULOS V, KOTZANIKO- LAOU P, et al. Strong forward security[ C]//IFIP-SECO1 Conference. Boston: Springer-Verlag, 2002 : 109-121. 被引量:1
  • 6DODIS Y, KATZ J, XU S, et al. Key-insulated public key cryptosystems [ C]//Advances in Cryptology-Eurocrypt' 2002. Berlin: Spring-Verlag, 2002: 65-82. 被引量:1
  • 7WENG J, LIU S L, CHEN K, et al. Identity-based threshold key-insulated encryption without random oracles [ C ]// CT-RSA 2008. Berlin: Spring-Verlag, 2008 : 203-220. 被引量:1
  • 8GROTH J, SAHAI A. Efficient non-interactive proof sys- tems for bilinear groups [ C ]//Advances in Cryptology- Eu- rocrypt'2008. Berlin: Springer-Verlag, 2008: 415-432. 被引量:1
  • 9BONEH D, BOYEN X, SHACHAM H. Short group signa- tures [ C ]//Advances in Cryptology-Crypto '2004. Berlin : Springer, 2004 : 227-242. 被引量:1
  • 10WENG J, LIU S, CHEN K, et al. Identity based kye- in- sulated signature without random oracles [ C ]//CIS 2006. Berlin: Springer-Verlag, 2007 : 470480. 被引量:1

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部