可證安全的傳統(tǒng)公鑰密碼-無證書公鑰密碼異構(gòu)聚合簽密方案
doi: 10.11999/JEIT170712 cstr: 32379.14.JEIT170712
基金項目:
國家自然科學基金(61163038, 61262056),甘肅省高等學??蒲许椖?2017A-003, 2015B-220)
Provable and Secure Traditional Public Key Infrastructure-certificateless Public Key Cryptography Heterogeneous Aggregate Signcryption Scheme
Funds:
The National Natural Science Foundation of China (61163038, 61262056), The Higher Educational Scientific Research Foundation of Gansu Province (2017A-003, 2015B-220)
-
摘要: 異構(gòu)簽密可以保證異構(gòu)密碼系統(tǒng)之間數(shù)據(jù)的機密性和不可偽造性。分析現(xiàn)有的異構(gòu)簽密方案,發(fā)現(xiàn)它們只針對單個消息,無法實現(xiàn)批驗證。聚合簽密能夠把不同用戶對多個消息產(chǎn)生的簽密密文同時發(fā)送給接收者,而且可以提供批量驗證,降低驗證開銷。該文提出一個傳統(tǒng)公鑰密碼-無證書公鑰密碼異構(gòu)聚合簽密方案,該方案不僅能夠保證傳統(tǒng)公鑰密碼(TPKI)和無證書公鑰密碼(CLPKC)系統(tǒng)間通信的機密性和認證性,而且聚合驗證時不需要雙線性對。在隨機預言模型下,基于間隙雙線性Diffie-Hellman困難問題、計算Diffie-Hellman困難問題和離散對數(shù)問題,證明該方案滿足自適應性選擇密文攻擊下的不可區(qū)分性和自適應選擇消息下的不可偽造性。
-
關鍵詞:
- 異構(gòu)簽密 /
- 聚合簽密 /
- 間隙雙線性Diffie-Hellman問題 /
- 計算Diffie-Hellman問題 /
- 離散對數(shù)問題
Abstract: Heterogeneous signcryption can be used to guarantee the confidentiality and the unforgeability in the different cryptographies. By analyzing some existing heterogeneous signcryption schemes, it is found that they only deal with a single message and can not achieve batch verification. Aggregation signcryption can not only take n distinct signcryption on n messages signed by n distinct users, but also provide a batch verification and reduce the cost of verification. In this paper, a Traditional Public Key Infrastructure (TPKI)-CertificateLess Public Key Cryptography (CLPKC) heterogeneous aggregation signcryption scheme is proposed, which can ensure the confidentiality and authentication between the TPKI and CLPKC. The scheme does not require bilinear pairings when it is aggregated. It is proved that the scheme has indistinguishability against adaptive chosen ciphertext attack and existential unforgeability against adaptive chosen messages attack under gap bilinear Diffie-Hellman and computational Diffie-Hellman problem and Discrete logarithm. -
SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Science China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5. LIBERT B and QUISQUATER J J. Improved signcryption from q-Diffie-Hellman problems[C]. International Conference on Security in Communication Networks, Amalfi, Italy, 2004: 220-234. doi: 10.1007/978-3-540-30598-9_16. HUANG Qiong, WONG D S, and YANG Guomin. Heterogeneous signcryption with key privacy[J]. The Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/ comjnl/bxq095. FU Xiaotong, LI Xiaowei, and LIU Wen. IDPKC-to-TPKC construction of multi-receiver signcryption[C]. International Conference on Intelligent Networking and Collaborative Systems (INCoS), Xian, China, 2013: 335-339. doi: 10.1109/ INCoS.2013.62. LI Fagen, ZHANG Hui, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012. 2221897. 張玉磊, 張靈剛, 張永潔, 等. 匿名 CLPKC-TPKI 異構(gòu)簽密方案[J]. 電子學報, 2016, 44(10): 2432-2439. doi: 10.3969/ j.issn.0372-2112.2016.10.022. ZHANG Yulei, ZHANG Linggang, ZHANG Yongjie, et al. CLPKC to TPKI heterogeneous signcryption scheme with anonymity[J]. Acta Electronica Sinica, 2016, 44(10): 2432-2439. doi: 10.3969/j.issn.0372-2112.2016.10.022. 劉景偉, 張俐歡, 孫蓉. 異構(gòu)系統(tǒng)下的雙向簽密方案[J]. 電子與信息學報, 2016, 38(11): 2948-2953. doi: 10.11999/ JEIT160056. LIU Jingwei, ZHANG Lihuan, and SUN Rong. Mutual signcryption schemes under heterogeneous systems[J]. Journal of Electronics Information Technology, 2016, 38(11): 2948-2953. doi: 10.11999/JEIT160056. LI Fagen, HAN Yanan, and JIN Chunhua. Practical signcryption for secure communication of wireless sensor networks[J]. Wireless Personal Communications, 2016, 89(4): 1391-1412. doi: 10.1007/s11277-016-3327-4. AN J H, DODIS Y, and RABIN T. On the security of joint signature and encryption[C]. Proceedings of the Cryptology EUROCRYPT 2002, Amsterdam, the Netherlands, 2002: 83-107. doi: 10.1007/3-540-46035-7_6. SELVI S, VIVEK S, SHRIRAM J, et al. Identity based aggregate signcryption schemes[C]. International Conference on Cryptology in India, New Delhi, India, 2009: 378-397. doi: 10.1007/978-3-642-10628-6_25. ESLAMI Z and PAKNIAT N. Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. 張玉磊, 王歡, 李臣意, 等. 可證安全的緊致無證書聚合簽密方案[J]. 電子與信息學報, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407. ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407. 羅敏, 孫騰, 張靜茵, 等. 兩個無證書聚合簽名方案的安全性分析[J]. 電子與信息學報, 2016, 38(10): 2695-2700. doi: 10.11999/JEIT151350. LUO Min, SUN Teng, ZHANG Jingyin, et al. Security analysis on two certificateless aggregate signature schemes[J]. Journal of Electronics Information Technology, 2016, 38(10): 2695-2700. doi: 10.11999/JEIT151350. 牛淑芬, 牛靈, 王彩芬, 等. 一種可證安全的異構(gòu)聚合簽密方案[J]. 電子與信息學報, 2017, 39(5): 1213-1218. doi: 10.11999 /JEIT160829. NIU Shufen, NIU Ling, WANG Caifen, et al. A provable aggregate signcryption for heterogeneous systems[J]. Journal of Electronics Information Technology, 2017, 39(5): 1213-1218. doi: 10.11999/JEIT160829. DAVID P and JACQUES S. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396. doi: 10.1007/s001450010003. -
計量
- 文章訪問數(shù): 1290
- HTML全文瀏覽量: 173
- PDF下載量: 162
- 被引次數(shù): 0