New Privacy Preserving Aggregate Signcryption for Heterogeneous Systems
-
摘要: 异构聚合签密方案不仅可以保证异构密码系统之间数据的机密性和不可伪造性,而且可以提供多个密文批量验证。该文分析了一个具有隐私保护功能的异构聚合签密方案的安全性,指出该方案不能抵挡恶意密钥生成中心(KGC)攻击,恶意KGC可以伪造有效的单密文和聚合密文。为了提高原方案的安全性,该文提出一种新的具有隐私保护功能的异构聚合签密方案。该方案克服了原方案存在的安全性问题,实现了无证书密码环境到身份密码环境之间的数据安全传输,在随机预言机模型下证明新方案的安全性。效率分析表明新方案与原方案效率相当。Abstract: The privacy preserving aggregate signcryption for heterogeneous systems can ensure the confidentiality and unforgeability of the data between heterogeneous cryptosystems, it also can provide multi-ciphertext batch verification. This paper analyzes the security of a scheme with privacy-preserving aggregate signcryption heterogeneous, and points out that the scheme can not resist the attack of malicious Key Generating Center (KGC), it can forge a valid ciphertext. In order to improve the security of the original scheme, a new heterogeneous aggregation signature scheme with privacy protection function is proposed.The new scheme overcomes the security problems existing in the original scheme and ensures the data transmission between the certificateless public key cryptography and the identity-based public key cryptographic, and the security of the new scheme is proved under the random oracle model. Efficiency analysis shows that the new program is equivalent to the original one.
-
表 1 基本运算耗费的时间(ms)
${T_{{\rm{add}}}}$ ${T_{{\rm{pm}}}}$ ${T_p}$ ${T_H}$ ${T_h}$ 0.023 3.382 3.711 6.720 1.024 表 2 签密方案效率比较
方案 签密 解签密 安全性 Niu方案 $(2n + 5){T_{{\rm{pm}}}} + {T_p} + 2{T_H}+ {T_h}$ $ + (n + 3){T_{{\rm{add}}}} \ge 41.849$ $n{T_{{\rm{pm}}}} + 5{T_p} + 3{T_H} + {T_h}$ $ + (n + 1){T_{{\rm{add}}}} \ge 42.143$ 低 本文方案 $(2n + 5){T_{{\rm{pm}}}} + {T_p} + {\rm{3}}{T_H} + {T_h}$ $ + (n + 3){T_{{\rm{add}}}} \ge 48.569$ $n{T_{{\rm{pm}}}} + 5{T_p} + 3{T_H} + {T_h}$ $ + (n + 1){T_{{\rm{add}}}} \ge 42.143$ 高 -
ZHENG Yuliang. Digital signcryption or how to achieve cost(signature & encryption)<<cost(signature)+cost (encryption)[C]. Proceedings of the Cryptology-CRYPTO, 1997: 165–179. 杜庆灵. 基于身份的动态群通信签密方案[J]. 信息网络安全, 2017(9): 42–44 doi: 10.3969/j.issn.1671-1122.2017.09.010DU Qingling. Identity based dynamic group communication signcryption scheme[J]. Netinfo Security, 2017(9): 42–44 doi: 10.3969/j.issn.1671-1122.2017.09.010 刘明烨, 韩益亮, 杨晓元. 基于准循环低密度奇偶校验码的签密方案研究[J]. 信息网络安全, 2016(11): 66–72 doi: 10.3969/j.issn.1671-1122.2016.11.011LIU Mingye, HAN Yiliang, and YANG Xiaoyuan. Research of signcyption based on QC-LDC[J]. Netinfo Security, 2016(11): 66–72 doi: 10.3969/j.issn.1671-1122.2016.11.011 SELVI S, VIVEK S, SHRIRAM J, et al. Identity based aggregate signcryption schemes[C]. International Conference on Cryptology in India, New Delhi, India, 2009: 378–397. BABAMIR F S and EALAMI Z. Data security in unattended wireless sensor networks through aggregate signcryption[J].KSII Transactions on Internet&Information Systems, 2012, 6(11): 2940–2955 doi: 10.3837/tiis.2012.10.011 HAN Yiliang, LU Wanyi, and ZHANG Jian. Identity based aggregate signcryption scheme[J]. Lecture Notes in Electrical Engineering, 2014, 273(7): 383–389 doi: 10.1007/978-3-642-40640-9-48 EALAMI Z snd NASROLLAH P. Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University Computer and Information Sciences, 2014, 26(3): 276–286 doi: 10.1016/j.jksuci.2014.03.006 SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Science China Information Sciences, 2010, 53(3): 557–566 doi: 10.1007/s11432-010-0061-5 HUANG Qiong, WONG D S, and YANG Guomin. Heterogeneous signcryption with key privacy[J]. The Computer Journal, 2011, 54(4): 525–536 doi: 10.1093/comjnl/bxq095 LI Fagen, ZHANG Hui, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420–429 doi: 10.1109/JSYST.2012.2221897 牛淑芬, 牛灵, 王彩芬, 等. 一种可证安全的异构聚合签密方案[J]. 电子与信息学报, 2017, 39(5): 1213–1218 doi: 10.11999/JEIT160829NIU Shufen, NIU Ling, WANG Caifen, et al. A provable aggregate signcryption for heterogeneous systems[J]. Journal of Electronics&Information Technology, 2017, 39(5): 1213–1218 doi: 10.11999/JEIT160829 王彩芬, 李亚红, 张玉磊, 等. 标准模型下高效的异构签密方案[J]. 电子与信息学报, 2017, 39(4): 881–886 doi: 10.11999/JEIT160662WANG Caifen, LI Yahong, ZHANG Yulei, et al. Efficient heterogeneous signcryption scheme in the standard model[J]. Journal of Electronics&Information Technology, 2017, 39(4): 881–886 doi: 10.11999/JEIT160662 张玉磊, 王欢, 刘文静, 等 . 异构双向签密方案的安全性分析和改进[J]. 电子与信息学报, 2017, 39(12): 3045–3050 doi: 10.11999/JEIT170203ZHANG Yulei, WANG Huan, LIU Wenjing, et al. Security analysis and improvement of mutual signcryption schemes under heterogeneous systems[J]. Journal of Electronics&Information Technology, 2017, 39(12): 3045–3050 doi: 10.11999/JEIT170203 张玉磊, 张灵刚, 王彩芬, 等. 可证安全的IDPKC-to-CLPKC异构签密方案[J]. 电子与信息学报, 2017, 39(9): 2127–2133 doi: 10.11999/JEIT170062ZHANG Yulei, ZHANG Linggang, WANG Caifen, et al. Provable secure IDPKC-to-CLPKC heterogeneous signcryption scheme[J]. Journal of Electronics&Information Technology, 2017, 39(9): 2127–2133 doi: 10.11999/JEIT170062 刘景伟, 张俐欢, 孙蓉. 异构系统下的双向签密方案[J]. 电子与信息学报, 2016, 38(11): 2948–2953 doi: 10.11999/JEIT160056LIU Jingwei, ZHANG Lihuan, and SUN Rong. Mutual signcryption schemes under heterogeneous systems[J]. Journal of Electronics&Information Technology, 2016, 38(11): 2948–2953 doi: 10.11999/JEIT160056 NIU Shufen, LI Zhenbin, and WANG Caifen. Privacy-Preserving Multi-party Aggregate Signcryption for Heterogeneous Systems[C]. International Conference on Cloud Computing and Security, Nanjing, China, 2017: 216–229.
表(2)
计量
- 文章访问数: 2045
- HTML全文浏览量: 621
- PDF下载量: 47
- 被引次数: 0