標(biāo)準(zhǔn)模型下高效的異構(gòu)簽密方案
doi: 10.11999/JEIT160662 cstr: 32379.14.JEIT160662
-
2.
(西北師范大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院 蘭州 730070) ②(西北師范大學(xué)數(shù)統(tǒng)學(xué)院 蘭州 730070)
國家自然科學(xué)基金(61163038, 61562077, 61662069), 甘肅省高等學(xué)校科研項(xiàng)目(2014-A011),西北師范大學(xué)青年教師科研能力提升計(jì)劃(NWNU-LKQN-14-7)
Efficient Heterogeneous Signcryption Scheme in the Standard Model
-
2.
(College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China)
The National Natural Science Foundation of China (61163038, 61562077, 61662069), Research Fund of Higher Education of Gansu Province (2014-A011), The Foundation for Excellent Young Teachers by Northwest Normal University (NWNU-LKQN-14-7)
-
摘要: 異構(gòu)簽密方案能夠?yàn)椴煌踩蛑g的數(shù)據(jù)通信提供機(jī)密性和認(rèn)證性。分析現(xiàn)有的異構(gòu)簽密方案,都是在隨機(jī)預(yù)言模型下可證安全的?;诖?,該文提出一個在標(biāo)準(zhǔn)模型下從基于身份的密碼到傳統(tǒng)公鑰設(shè)施的簽密方案,利用計(jì)算Diffie-Hellman問題和判定雙線性Diffie-Hellman問題的困難性,對該方案的機(jī)密性和不可偽造性進(jìn)行了證明。通過理論和實(shí)驗(yàn)分析,該方案在計(jì)算成本和通信成本方面具有更高的效率。
-
關(guān)鍵詞:
- 異構(gòu)簽密 /
- 標(biāo)準(zhǔn)模型 /
- 基于身份的密碼 /
- 傳統(tǒng)公鑰設(shè)施
Abstract: Heterogeneous signcryption scheme can ensure the confidentiality and the authentication?for data communication between different security domains. Some existing heterogeneous signcryption schemes are analyzed to be secure in the random oracle model. Based on this problem, an Identity-Based Cryptography (IBC) to Public Key Infrastructure (PKI) signcryption scheme is proposed. The proposed scheme has the confidentiality and the unforgeability under the Computational Diffie-Hellman (CDH) problem and the Decisional Bilinear Diffie-HellmanB (DBDH) problem. Through the theoretical and experimental analysis, both the computational costs and the communication overheads of the proposed scheme are more efficient. -
ZHENG Y. Digital signcryption or how to achieve cost (signature encryption)cost(signature)+cost (encryption)[C]. Proceedings of the Cryptology- CRYPTO1997, California, USA, 1997: 165-179. doi: 10. 1007/BFb0052234. PAN Chunhua, LI Shunpeng, ZHU Qihui, et al. Notes on proxy signcryption and multi-proxy signature schemes[J]. International Journal of Network Security, 2015, 17(1): 29-33. 項(xiàng)順伯, 徐兵, 柯文德. 基于身份的在線/離線廣播簽密方案[J]. 四川大學(xué)學(xué)報(bào)(工程科學(xué)版), 2016, 48(2): 156-161. doi: 10.1007/BFb0052234.10.15961/j.jsuese.2016.02.023. XIANG Shunbo, XU Bing, and KE Wende. Identity-based online /offline broadcast signcryption scheme[J]. Journal of Sichuan University (Engineer Science), 2016, 48(2): 156-161. doi: 10.1007/BFb0052234.10.15961/j.jsuese.2016.02.023. 李慧賢, 巨龍飛. 對一個匿名多接收者簽密方案的安全性分析與改進(jìn)[J]. 電子學(xué)報(bào), 2015, 43(11): 2187-2193. doi:10.3969 /j. issn.0372-2112.2015.11.008. LI Huixian and JU Longfei. Security analysis and improvement of an anonymous multi-receiver signcryption scheme[J]. Acta Electronica Sinica, 2015, 43(11): 2187-2193. doi: 10.3969/j.issn.0372-2112.2015.11.008. 張玉磊, 王歡, 李臣意, 等. 可證安全的緊致無證書聚合簽密方案[J]. 電子與信息學(xué)報(bào), 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407. ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption Scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407. 劉雪峰, 張玉清, 王鶴, 等. 一種后向撤銷隱私安全的車載自組織網(wǎng)絡(luò)快速匿名消息認(rèn)證協(xié)議[J]. 電子與信息學(xué)報(bào), 2014, 36(1): 94-100. doi: 10.3724/SP.J.1146.2013.00342. LIU Xuefeng, ZHANG Yuqing, WANG He, et al. An efficient anonymity message authentication with backward secure revocation for vehicular Ad hoc networks[J]. Journal of Electronics Information Technology, 2014, 36(1): 94-100. doi: 10.3724/SP.J.1146.2013.00342. 張宇, 陳晶, 杜瑞穎, 等. 適于車載網(wǎng)安全通信的高效簽密方案[J]. 電子學(xué)報(bào), 2015, 43(3): 512-517. doi: 10.3969/j.issn. 0372-2112.2015.03.015. ZHANG Yu, CHEN Jing, DU Ruiying, et al. An efficient signcryption scheme for secure communication of VANET[J]. Acta Electronica Sinica, 2015, 43(3): 512-517. doi: 10.3969/j. issn.0372-2112.2015.03.015. TAN C. Signcryption scheme in multi-user setting without random oracles[C]. Proceedings of the 3rd International Workshop on Security, Kagawa, Japan, 2008: 64-82. doi: 10.1007/978-3-540-89598-5_5. LI Fageng and TAKAGI T. Secure identity-based signcryption in the standard model[J]. Mathematical Computer Modelling, 2013, 57(11/12): 2685-2694. doi: 10.1016/j.mcm.2011.06.043. LI Xiangxue, QIAN Haifeng, WENG Jian, et al. Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model[J]. Mathematical Computer Modelling, 2013, 57(3/4): 503-511. doi: 10.1016/j.mcm. 2012.06.030. LI Fageng, ZHANG Mingwu, and TSUYOSHI T. Efficient signcryption in the standard model[J]. Concurrency Computation Practice Experience, 2012, 24(17): 1977-1989. doi: 10.1002/cpe.1823. SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Sciece China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5. HUANG Qiong, DUN C, and YAN Guomin. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095. LI Fageng, ZHANG Hui, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012. 2221897. SHOUP V. OAEP Reconsidered[J]. Journal of Cryptology, 2000, 15(4): 223-249. doi: 10.1007/3-540-44647-8_15. -
計(jì)量
- 文章訪問數(shù): 1212
- HTML全文瀏覽量: 198
- PDF下載量: 393
- 被引次數(shù): 0