期刊文献+

基于身份的多接收者签密方案 被引量:1

Identity based multi-receiver signcryption scheme
下载PDF
导出
摘要 为满足广播环境下通信数据的机密性和认证性的需求,设计一种基于身份的多接收者签密方案。采用减少双线性对运算次数的方法,降低方案的计算量和通信成本;在判定双线性Diffie-Hellman(decisional bilinear Diffie-Hellman,DBDH)与计算Diffie-Hellman(computational Diffie-Hellman,CDH)是难解问题的假设基础之上,证明方案在随机预言模型下满足不可区分性和不可伪造性,分析其正确性。通过与其它基于身份的多接收者签密方案进行比较,验证了该方案具有更低的运算量。 To satisfy the requirement of confidentiality and authentication of communication data in broadcasting environment,an identity-based multi-receiver signcryption scheme was proposed.By using the method of reducing the number of bilinear pairing operations,the computational complexity and communication cost of the proposed scheme were reduced.Based on the assumptions of hard problems of decisional bilinear Diffie-Hellman(DBDH)and computational Diffie-Hellman(CDH),the proposed scheme was proved to be indistinguishable and unforgeable in the random oracle model,and the correctness of the scheme was analyzed.Compared with other the identity-based multi-receiver signcryption scheme,the proposed scheme is verified to have lower computational complexity.
作者 郭会 邓伦治 GUO Hui;DENG Lun-zhi(School of Mathematical Science,Guizhou Normal University,Guiyang 550001,China)
出处 《计算机工程与设计》 北大核心 2019年第9期2435-2439,2445,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(61562012) 贵州省教育厅创新群体重大研究基金项目(黔教合KY字2016【026】)
关键词 基于身份密码 签密 多接收者 双线性映射 随机预言模型 identity based cryptography signcryption multi-receiver bilinear mapping random oracle model
  • 相关文献

参考文献9

二级参考文献79

  • 1耿莉,王尚平,周峰,燕召将.一种新的基于身份的签密方案[J].计算机工程,2004,30(19):52-54. 被引量:9
  • 2李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 3李慧贤,蔡皖东,庞辽军.一个安全的动态门限签名体制[J].计算机研究与发展,2007,44(9):1545-1549. 被引量:6
  • 4Zheng Yuliang. Digital signcryption or how to achieve cost(signature encryption) << cost ( signature) + cost(encryption) [G] //LNCS 1294:Advances in Cryptology(CRYPTO’ 97). Berlin:Springer,1997:165-179. 被引量:1
  • 5Yu Yong,Yang Bo,Huang Xinyi,et al. Efficient identity-based signcryption scheme for multiple receivers [G] // LNCS4610:Proc of the 4th Int Conf on Autonomic and TrustedComputing (ATC’07). Berlin:Springer,2007:13-21. 被引量:1
  • 6Malone-Lee J,Mao W. Two birds one stone:Signcryptionschemes using RSA [G] // LNCS 2612:Proc of CT-RSA,03.Berlin:Springer,2003:211-226. 被引量:1
  • 7Baek J,Steinfeld R,Zheng Yuliang. Formal proofs for thesecurity of signcryption [J]. Journal of Cryptology,2007,20(2):203-235. 被引量:1
  • 8Zhang Mingwu,Zhong Yusheng,Li Pengcheng,et al.Analysis and enhance of anonymous signcryption model[EB/OL]. [2011-10-15],http://eprint. iacr. org/ 2009/194pdf. 被引量:1
  • 9Baek J,Safavi-Naini R,Susilo W. Efficient multi-receiveridentity based encryption and its application to broadcastencryption [G] //LNCS 3386:Proc of the 8th Int Workshopon Theory and Practice in Public Key Cryptography. Berlin:Springer,2005:380-397. 被引量:1
  • 10Duan Shanshan,Cao Zhenfu. Efficient and provably securemulti receiver identity based signcryption [G] //LNCS 4058:Proc of the 11th Australasian Conf on Information Securityand Privacy (ACISP'06). Berlin; Springer,2006:195-206. 被引量:1

共引文献24

同被引文献19

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部