高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

异构系统下的双向签密方案

刘景伟 张俐欢 孙蓉

刘景伟, 张俐欢, 孙蓉. 异构系统下的双向签密方案[J]. 电子与信息学报, 2016, 38(11): 2948-2953. doi: 10.11999/JEIT160056
引用本文: 刘景伟, 张俐欢, 孙蓉. 异构系统下的双向签密方案[J]. 电子与信息学报, 2016, 38(11): 2948-2953. doi: 10.11999/JEIT160056
LIU Jingwei, ZHANG Lihuan, SUN Rong. Mutual Signcryption Schemes under Heterogeneous Systems[J]. Journal of Electronics & Information Technology, 2016, 38(11): 2948-2953. doi: 10.11999/JEIT160056
Citation: LIU Jingwei, ZHANG Lihuan, SUN Rong. Mutual Signcryption Schemes under Heterogeneous Systems[J]. Journal of Electronics & Information Technology, 2016, 38(11): 2948-2953. doi: 10.11999/JEIT160056

异构系统下的双向签密方案

doi: 10.11999/JEIT160056
基金项目: 

陕西省自然科学基础研究计划 (2016JM6057),国家科技重大专项(2013ZX03005007),高等学校学科创新引智计划(B08038)

Mutual Signcryption Schemes under Heterogeneous Systems

Funds: 

The Natural Science Basic Research Plan in Shaanxi Province of China (2016JM6057), The National Science and Technology Major Project of the Ministry of Science and Technology of China (2013ZX03005007), The 111 Project (B08038)

  • 摘要: 在过去的研究中,人们通常假设通信双方都处在同一个公钥密码体制环境中,但随着科技的发展和网络的普及,不同的地区可能采用不同的公钥密码体制。为了解决异构系统之间的通信安全问题,该文提出两种在公共密钥基础设施(PKI)和无证书公钥密码体制(CLC)下安全通信的异构签密方案。同时在双线性Diffie-Hellman问题(BDHP)和计算性Diffie-Hellman问题(CDHP)的难解性下,所提方案在随机预言模型中具有自适应选择密文攻击下的不可区分性(IND-CCA2)和自适应选择消息攻击下的不可伪造性(EUF-CMA)。
  • SHAMIR A. Identity-based cryptosystem and signature scheme [C]. Proceedings of CRYPTO 84 on Advances in cryptology, New York, NY, USA, 1984, 196: 47-53. doi: 10.1007/3-540-39568-7_5 .
    AL-RIYAMI S S and PATERSON K G. Certificateless public key cryptography[C]. International Conference on the Theory and Application of Cryptology and Information Security, Taipei, China, 2003: 452-473. doi: 10.1007/978-3-540-40061- 5_29.
    ZHENG Yuliang. Digital signcryption or how to achieve cost (signature encryption)cost (signature) +cost (encryption)[C]. Proceedings of the Cryptology- Crypto 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234
    BAEK J, STEINFELD R, and ZHENG Yuliang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology PKC2002, Paris, France, 2002: 81-98. doi: 10.1007/3-540-45664-3_6.
    CH A S, UDDIN N, SHER M, et al. An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography?[J]. Multimedia Tools and Applications, 2015, 74(5): 1711-1723. doi: 10.1007/s11042- 014-2283-9.
    LI C K, YANG G, WONG D S, et al. An efficient signcryption scheme with key privacy[C]. Proceedings of the 4th European Public Key Infrastructure Workshop (EuroPKI 2007), Palma de Mallorca, Spain, 2007, 4582: 78-93. doi: 10. 1007/978-3-540-73408-6_6.
    QIN Bo, WANG Huaqun, WU Qianhong, et al. An simultaneous authentication and secrecy in identity-based data upload to cloud[J]. Cluster Computing, 2013, 16(4): 845-859. doi: 10.1007/s10586-013-0258-7.
    PANG Liaojun, GAO Lu, LI Huixian, et al. Anonymous multi-receiver ID-based signcryption scheme[J]. Information Security, 2015, 9(3): 193-201. doi: 10.1049/iet-ifs.2014.0360.
    BARBOSA M and FARSHIM P. Certificateless signcryption [C]. Proceedings of the ASIACCS2008, New York, USA, 2008: 369-372. doi: 10.1145/1368310.1368364.
    张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015, 37(12): 2839-2844. doi: 10.11999/JEIT150407.
    ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2839-2844. doi: 10.11999/JEIT150407.
    孙银霞, 李晖, 李小青. 无证书体制下的多接收者签密密钥封装机制[J]. 电子与信息学报, 2010, 32(9): 2249-2252. doi: 10.3724/SP. J.1146.2009.01260.
    SUN Yinxia, LI Hui, and LI Xiaoqing. Certificateless signcryption KEM to multiple recipients[J]. Journal of Electronics Information Technology, 2010, 32(9): 2249-2252. doi: 10.3724/SP.J.1146.2009.01260.
    葛爱军, 陈少真. 具有强安全性的不含双线性对的无证书签名方案[J]. 电子与信息学报, 2010, 32(7): 1766-1768. doi: 10.3724/SP.J.1146.2009.00965.
    GE Aijun and CHEN Shaozhen. Strongly secure certificateless signature scheme without pairings[J]. Journal of Electronics Information Technology, 2010, 32(7): 1766-1768. doi: 10.3724/SP.J.1146.2009.00965.
    ESLAMI Z and PAKNIAT N. Certificateless aggregate signcryption: security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. doi: 10.1016/j.jksuci.2014.03.006.
    YIN A and LIANG H. Certificateless hybrid signcryption scheme for secure sommunication of wireless sensor networks [J]. Wireless Personal Communications, 2015, 80(3): 1049-1062. doi: 10.1007/s11277-014-2070-y.10.
    HAFIZUL ISLAM S K and LI Fagen. Leakage-free and provably secure certificateless signcryption scheme using bilinear pairings[J]. The Computer Journal, 2015, 58(10): 2636-2648. doi: 10.1093/comjnl/bxv002.
    SUN Yinxia and LI Hui. Eifficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Secience China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
    HUANG Q, WONG D S, and YANG G. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095.
    LI Fagen, ZHANG Hui, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 1109/JSYST.2012. 2221897.
    俞惠芳, 杨波. 可证安全的无证书混合签密[J]. 计算机学报, 2015, 38(4): 805-813. doi: 10.3724/SP.J.1016.2015.00804.
    YU Huifang and YANG Bo. Provably secure certificateless hybrid signcryption[J]. Chinese Journal of Computers, 2015, 38(4): 805-813. doi: 10.3724/SP.J.1016.2015.00804.
  • 加载中
计量
  • 文章访问数:  1427
  • HTML全文浏览量:  178
  • PDF下载量:  420
  • 被引次数: 0
出版历程
  • 收稿日期:  2016-01-13
  • 修回日期:  2016-06-09
  • 刊出日期:  2016-11-19

目录

    /

    返回文章
    返回