高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

可证安全的传统公钥密码-无证书公钥密码异构聚合签密方案

张玉磊 王欢 马彦丽 刘文静 王彩芬

张玉磊, 王欢, 马彦丽, 刘文静, 王彩芬. 可证安全的传统公钥密码-无证书公钥密码异构聚合签密方案[J]. 电子与信息学报, 2018, 40(5): 1079-1086. doi: 10.11999/JEIT170712
引用本文: 张玉磊, 王欢, 马彦丽, 刘文静, 王彩芬. 可证安全的传统公钥密码-无证书公钥密码异构聚合签密方案[J]. 电子与信息学报, 2018, 40(5): 1079-1086. doi: 10.11999/JEIT170712
ZHANG Yulei, WANG Huan, MA Yanli, LIU Wenjing, WANG Caifen. Provable and Secure Traditional Public Key Infrastructure-certificateless Public Key Cryptography Heterogeneous Aggregate Signcryption Scheme[J]. Journal of Electronics & Information Technology, 2018, 40(5): 1079-1086. doi: 10.11999/JEIT170712
Citation: ZHANG Yulei, WANG Huan, MA Yanli, LIU Wenjing, WANG Caifen. Provable and Secure Traditional Public Key Infrastructure-certificateless Public Key Cryptography Heterogeneous Aggregate Signcryption Scheme[J]. Journal of Electronics & Information Technology, 2018, 40(5): 1079-1086. doi: 10.11999/JEIT170712

可证安全的传统公钥密码-无证书公钥密码异构聚合签密方案

doi: 10.11999/JEIT170712
基金项目: 

国家自然科学基金(61163038, 61262056),甘肃省高等学校科研项目(2017A-003, 2015B-220)

Provable and Secure Traditional Public Key Infrastructure-certificateless Public Key Cryptography Heterogeneous Aggregate Signcryption Scheme

Funds: 

The National Natural Science Foundation of China (61163038, 61262056), The Higher Educational Scientific Research Foundation of Gansu Province (2017A-003, 2015B-220)

  • 摘要: 异构签密可以保证异构密码系统之间数据的机密性和不可伪造性。分析现有的异构签密方案,发现它们只针对单个消息,无法实现批验证。聚合签密能够把不同用户对多个消息产生的签密密文同时发送给接收者,而且可以提供批量验证,降低验证开销。该文提出一个传统公钥密码-无证书公钥密码异构聚合签密方案,该方案不仅能够保证传统公钥密码(TPKI)和无证书公钥密码(CLPKC)系统间通信的机密性和认证性,而且聚合验证时不需要双线性对。在随机预言模型下,基于间隙双线性Diffie-Hellman困难问题、计算Diffie-Hellman困难问题和离散对数问题,证明该方案满足自适应性选择密文攻击下的不可区分性和自适应选择消息下的不可伪造性。
  • SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Science China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
    LIBERT B and QUISQUATER J J. Improved signcryption from q-Diffie-Hellman problems[C]. International Conference on Security in Communication Networks, Amalfi, Italy, 2004: 220-234. doi: 10.1007/978-3-540-30598-9_16.
    HUANG Qiong, WONG D S, and YANG Guomin. Heterogeneous signcryption with key privacy[J]. The Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/ comjnl/bxq095.
    FU Xiaotong, LI Xiaowei, and LIU Wen. IDPKC-to-TPKC construction of multi-receiver signcryption[C]. International Conference on Intelligent Networking and Collaborative Systems (INCoS), Xian, China, 2013: 335-339. doi: 10.1109/ INCoS.2013.62.
    LI Fagen, ZHANG Hui, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012. 2221897.
    张玉磊, 张灵刚, 张永洁, 等. 匿名 CLPKC-TPKI 异构签密方案[J]. 电子学报, 2016, 44(10): 2432-2439. doi: 10.3969/ j.issn.0372-2112.2016.10.022.
    ZHANG Yulei, ZHANG Linggang, ZHANG Yongjie, et al. CLPKC to TPKI heterogeneous signcryption scheme with anonymity[J]. Acta Electronica Sinica, 2016, 44(10): 2432-2439. doi: 10.3969/j.issn.0372-2112.2016.10.022.
    刘景伟, 张俐欢, 孙蓉. 异构系统下的双向签密方案[J]. 电子与信息学报, 2016, 38(11): 2948-2953. doi: 10.11999/ JEIT160056.
    LIU Jingwei, ZHANG Lihuan, and SUN Rong. Mutual signcryption schemes under heterogeneous systems[J]. Journal of Electronics Information Technology, 2016, 38(11): 2948-2953. doi: 10.11999/JEIT160056.
    LI Fagen, HAN Yanan, and JIN Chunhua. Practical signcryption for secure communication of wireless sensor networks[J]. Wireless Personal Communications, 2016, 89(4): 1391-1412. doi: 10.1007/s11277-016-3327-4.
    AN J H, DODIS Y, and RABIN T. On the security of joint signature and encryption[C]. Proceedings of the Cryptology EUROCRYPT 2002, Amsterdam, the Netherlands, 2002: 83-107. doi: 10.1007/3-540-46035-7_6.
    SELVI S, VIVEK S, SHRIRAM J, et al. Identity based aggregate signcryption schemes[C]. International Conference on Cryptology in India, New Delhi, India, 2009: 378-397. doi: 10.1007/978-3-642-10628-6_25.
    ESLAMI Z and PAKNIAT N. Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286.
    张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
    ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
    罗敏, 孙腾, 张静茵, 等. 两个无证书聚合签名方案的安全性分析[J]. 电子与信息学报, 2016, 38(10): 2695-2700. doi: 10.11999/JEIT151350.
    LUO Min, SUN Teng, ZHANG Jingyin, et al. Security analysis on two certificateless aggregate signature schemes[J]. Journal of Electronics Information Technology, 2016, 38(10): 2695-2700. doi: 10.11999/JEIT151350.
    牛淑芬, 牛灵, 王彩芬, 等. 一种可证安全的异构聚合签密方案[J]. 电子与信息学报, 2017, 39(5): 1213-1218. doi: 10.11999 /JEIT160829.
    NIU Shufen, NIU Ling, WANG Caifen, et al. A provable aggregate signcryption for heterogeneous systems[J]. Journal of Electronics Information Technology, 2017, 39(5): 1213-1218. doi: 10.11999/JEIT160829.
    DAVID P and JACQUES S. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396. doi: 10.1007/s001450010003.
  • 加载中
计量
  • 文章访问数:  1243
  • HTML全文浏览量:  160
  • PDF下载量:  157
  • 被引次数: 0
出版历程
  • 收稿日期:  2017-07-19
  • 修回日期:  2017-12-26
  • 刊出日期:  2018-05-19

目录

    /

    返回文章
    返回