高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一种可证安全的异构聚合签密方案

牛淑芬 牛灵 王彩芬 杜小妮

牛淑芬, 牛灵, 王彩芬, 杜小妮. 一种可证安全的异构聚合签密方案[J]. 电子与信息学报, 2017, 39(5): 1213-1218. doi: 10.11999/JEIT160829
引用本文: 牛淑芬, 牛灵, 王彩芬, 杜小妮. 一种可证安全的异构聚合签密方案[J]. 电子与信息学报, 2017, 39(5): 1213-1218. doi: 10.11999/JEIT160829
NIU Shufen, NIU Ling, WANG Caifen, DU Xiaoni. A Provable Aggregate Signcryption for Heterogeneous Systems[J]. Journal of Electronics & Information Technology, 2017, 39(5): 1213-1218. doi: 10.11999/JEIT160829
Citation: NIU Shufen, NIU Ling, WANG Caifen, DU Xiaoni. A Provable Aggregate Signcryption for Heterogeneous Systems[J]. Journal of Electronics & Information Technology, 2017, 39(5): 1213-1218. doi: 10.11999/JEIT160829

一种可证安全的异构聚合签密方案

doi: 10.11999/JEIT160829
基金项目: 

国家自然科学基金(61562077, 61462077, 61662071),西北师范大学青年教师科研提升计划(NWNU-LKQN-13-12)

A Provable Aggregate Signcryption for Heterogeneous Systems

Funds: 

The National Natural Science Foundation of China (61562077, 61462077, 61662071), The Young Teachers Scientific Research Ability Promotion Program of Northwest Normal University (NWNU-LKQN-13-12)

  • 摘要: 异构签密可实现不同安全域之间数据通信的机密性、认证性和不可伪造性。分析现有的异构签密方案,发现它们仅是针对单个消息而设计的,计算效率普遍较低,不适合大数据环境下的网络通信系统。该文提出一个异构的聚合签密方案,该方案不但可以实现单个消息的签密验证,而且可以实现多个消息的聚合验证,并且验证需要的双线性对个数固定,与所签密消息的个数无关。同时,在随机预言模型下,证明了方案的机密性和不可伪造性分别基于q双线性Diffie-Hellman逆问题和离散对数问题。数值结果表明,该方案与现有方案相比在计算效率和传输效率上有着极大的提高。
  • ZHENG Yuliang. Digital signcryption or how to achieve cost(signature encryption)cost(signature) +cost (encryption)[C]. Proceedings of the Cryptology-CRYPTO, 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234.
    BAEK J, STEINFELD R, and ZHENG Yuliang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology-PKC2002, Paris, France, 2002: 81-98. doi: 10. 1007/3-540-45664-3_6.
    PANG Liaojun, GAO Lu, LI Huixian, et al. Anonymous multi-receiver ID-based signcryption scheme[J]. Iet Information Security, 2015, 9(3): 194-201. doi: 10.1049/ iet-ifs.2014.0360.
    LI Fagen, ZHANG Hui, and TSUYOSHI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012. 2221897.
    张雪, 冀会芳, 李光松, 等. 基于身份的跨信任域签密方案[J]. 计算机科学, 2015, 42(5): 165-168. doi: 10.11896/j.issn.1002- 137X.2015.5.033.
    ZHANG Xue, JI Huifang, LI Guangsong, et al. Identity-based signcryption cross autonomous domains[J]. Computer Science, 2015, 42(5): 165-168. doi: 10.11896/j.issn.1002-137X. 2015.5.033.
    ZHOU Yanwei, YANG Bo, and ZHANG Wenzheng. Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing[J]. Discrete Applied Mathematics, 2016, 204(C): 185-202. doi: 10.1016/ j.dam.2015.10.018.
    LI Fagen, HAN Yanan, and JIN Chunhua. Practical signcryption for secure communication of wireless sensor networks[J]. Wireless Personal Communications, 2016, 89(4): 1391-1412. doi: 10.1007/s11277-016-3327-4.
    SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Sciece China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
    HUANG Qiong, WONG D S, and YANG Guomin. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095.
    张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
    ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
    WANG Hao, LIU Zhen, LIU Zhe, et al. Identity-based aggregate signcryption in the standard model from multilinear maps[J]. Frontiers of Computer Science, 2016, 10(4): 741-754. doi: 10.1007/s11704-015-5138-2.
    HAN Yiliang and CHEN Fei. The multilinear maps based certificateless aggregate signcryption scheme[C]. IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Xian, China, 2015: 92-99. doi: 10.1109/CyberC.2015.93.
    ESLAMI Z and PAKNIAT N. Certificateless aggregate signcryption[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. doi: 10. 1016/j.jksuci.2014.03.006.
    CHEN Juqin and REN Xiaoxi. A privacy protection scheme based on certificateless aggregate signcryption and masking random number in smart grid[C]. International Conference on Mechanical Materials and Manufacturing Engineering, Wuhan, China, 2016: 10-13. doi: 10.2991/mmme-16.2016.3.
    DAVID P and JACQUES S. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396. doi: 10.1007=s001450010003.
  • 加载中
计量
  • 文章访问数:  1136
  • HTML全文浏览量:  157
  • PDF下载量:  273
  • 被引次数: 0
出版历程
  • 收稿日期:  2016-08-15
  • 修回日期:  2017-01-13
  • 刊出日期:  2017-05-19

目录

    /

    返回文章
    返回