高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

标准模型下高效的异构签密方案

王彩芬 李亚红 张玉磊 牛淑芬

王彩芬, 李亚红, 张玉磊, 牛淑芬. 标准模型下高效的异构签密方案[J]. 电子与信息学报, 2017, 39(4): 881-886. doi: 10.11999/JEIT160662
引用本文: 王彩芬, 李亚红, 张玉磊, 牛淑芬. 标准模型下高效的异构签密方案[J]. 电子与信息学报, 2017, 39(4): 881-886. doi: 10.11999/JEIT160662
WANG Caifen, LI Yahong, ZHANG Yulei, NIU Shufen. Efficient Heterogeneous Signcryption Scheme in the Standard Model[J]. Journal of Electronics & Information Technology, 2017, 39(4): 881-886. doi: 10.11999/JEIT160662
Citation: WANG Caifen, LI Yahong, ZHANG Yulei, NIU Shufen. Efficient Heterogeneous Signcryption Scheme in the Standard Model[J]. Journal of Electronics & Information Technology, 2017, 39(4): 881-886. doi: 10.11999/JEIT160662

标准模型下高效的异构签密方案

doi: 10.11999/JEIT160662
基金项目: 

国家自然科学基金(61163038, 61562077, 61662069), 甘肃省高等学校科研项目(2014-A011),西北师范大学青年教师科研能力提升计划(NWNU-LKQN-14-7)

Efficient Heterogeneous Signcryption Scheme in the Standard Model

Funds: 

The National Natural Science Foundation of China (61163038, 61562077, 61662069), Research Fund of Higher Education of Gansu Province (2014-A011), The Foundation for Excellent Young Teachers by Northwest Normal University (NWNU-LKQN-14-7)

  • 摘要: 异构签密方案能够为不同安全域之间的数据通信提供机密性和认证性。分析现有的异构签密方案,都是在随机预言模型下可证安全的。基于此,该文提出一个在标准模型下从基于身份的密码到传统公钥设施的签密方案,利用计算Diffie-Hellman问题和判定双线性Diffie-Hellman问题的困难性,对该方案的机密性和不可伪造性进行了证明。通过理论和实验分析,该方案在计算成本和通信成本方面具有更高的效率。
  • ZHENG Y. Digital signcryption or how to achieve cost (signature encryption)cost(signature)+cost (encryption)[C]. Proceedings of the Cryptology- CRYPTO1997, California, USA, 1997: 165-179. doi: 10. 1007/BFb0052234.
    PAN Chunhua, LI Shunpeng, ZHU Qihui, et al. Notes on proxy signcryption and multi-proxy signature schemes[J]. International Journal of Network Security, 2015, 17(1): 29-33.
    项顺伯, 徐兵, 柯文德. 基于身份的在线/离线广播签密方案[J]. 四川大学学报(工程科学版), 2016, 48(2): 156-161. doi: 10.1007/BFb0052234.10.15961/j.jsuese.2016.02.023.
    XIANG Shunbo, XU Bing, and KE Wende. Identity-based online /offline broadcast signcryption scheme[J]. Journal of Sichuan University (Engineer Science), 2016, 48(2): 156-161. doi: 10.1007/BFb0052234.10.15961/j.jsuese.2016.02.023.
    李慧贤, 巨龙飞. 对一个匿名多接收者签密方案的安全性分析与改进[J]. 电子学报, 2015, 43(11): 2187-2193. doi:10.3969 /j. issn.0372-2112.2015.11.008.
    LI Huixian and JU Longfei. Security analysis and improvement of an anonymous multi-receiver signcryption scheme[J]. Acta Electronica Sinica, 2015, 43(11): 2187-2193. doi: 10.3969/j.issn.0372-2112.2015.11.008.
    张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
    ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption Scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
    刘雪峰, 张玉清, 王鹤, 等. 一种后向撤销隐私安全的车载自组织网络快速匿名消息认证协议[J]. 电子与信息学报, 2014, 36(1): 94-100. doi: 10.3724/SP.J.1146.2013.00342.
    LIU Xuefeng, ZHANG Yuqing, WANG He, et al. An efficient anonymity message authentication with backward secure revocation for vehicular Ad hoc networks[J]. Journal of Electronics Information Technology, 2014, 36(1): 94-100. doi: 10.3724/SP.J.1146.2013.00342.
    张宇, 陈晶, 杜瑞颖, 等. 适于车载网安全通信的高效签密方案[J]. 电子学报, 2015, 43(3): 512-517. doi: 10.3969/j.issn. 0372-2112.2015.03.015.
    ZHANG Yu, CHEN Jing, DU Ruiying, et al. An efficient signcryption scheme for secure communication of VANET[J]. Acta Electronica Sinica, 2015, 43(3): 512-517. doi: 10.3969/j. issn.0372-2112.2015.03.015.
    TAN C. Signcryption scheme in multi-user setting without random oracles[C]. Proceedings of the 3rd International Workshop on Security, Kagawa, Japan, 2008: 64-82. doi: 10.1007/978-3-540-89598-5_5.
    LI Fageng and TAKAGI T. Secure identity-based signcryption in the standard model[J]. Mathematical Computer Modelling, 2013, 57(11/12): 2685-2694. doi: 10.1016/j.mcm.2011.06.043.
    LI Xiangxue, QIAN Haifeng, WENG Jian, et al. Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model[J]. Mathematical Computer Modelling, 2013, 57(3/4): 503-511. doi: 10.1016/j.mcm. 2012.06.030.
    LI Fageng, ZHANG Mingwu, and TSUYOSHI T. Efficient signcryption in the standard model[J]. Concurrency Computation Practice Experience, 2012, 24(17): 1977-1989. doi: 10.1002/cpe.1823.
    SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Sciece China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
    HUANG Qiong, DUN C, and YAN Guomin. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095.
    LI Fageng, ZHANG Hui, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012. 2221897.
    SHOUP V. OAEP Reconsidered[J]. Journal of Cryptology, 2000, 15(4): 223-249. doi: 10.1007/3-540-44647-8_15.
  • 加载中
计量
  • 文章访问数:  1175
  • HTML全文浏览量:  187
  • PDF下载量:  391
  • 被引次数: 0
出版历程
  • 收稿日期:  2016-06-24
  • 修回日期:  2016-12-13
  • 刊出日期:  2017-04-19

目录

    /

    返回文章
    返回