高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一个基于CPK的高效签密方案

陈永刚 贾春福 吕述望

陈永刚, 贾春福, 吕述望. 一个基于CPK的高效签密方案[J]. 电子与信息学报, 2009, 31(7): 1753-1757. doi: 10.3724/SP.J.1146.2008.01113
引用本文: 陈永刚, 贾春福, 吕述望. 一个基于CPK的高效签密方案[J]. 电子与信息学报, 2009, 31(7): 1753-1757. doi: 10.3724/SP.J.1146.2008.01113
Chen Yong-gang, Jia Chun-fu, Lü Shu-wang. An Efficient Signcryption Scheme Based on CPK[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1753-1757. doi: 10.3724/SP.J.1146.2008.01113
Citation: Chen Yong-gang, Jia Chun-fu, Lü Shu-wang. An Efficient Signcryption Scheme Based on CPK[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1753-1757. doi: 10.3724/SP.J.1146.2008.01113

一个基于CPK的高效签密方案

doi: 10.3724/SP.J.1146.2008.01113
基金项目: 

天津市应用基础及前沿技术研究计划项目(09JCBJC00300)和天津市科技发展计划项目基金(05YFGZGX24200)资助课题

An Efficient Signcryption Scheme Based on CPK

  • 摘要: 基于组合公钥原理,该文提出一个新的签密方案CPK-SC,抛弃了传统基于身份签密方案中的配对运算,并通过使用对称密码算法解决了传统基于身份签密方案只能处理定长消息的限制。与已有的基于双线性对的签密方案相比,CPK-SC方案计算量小、生成密文短,适用于计算和通信资源受限环境,具有广泛的应用前景。在判定性Diffie-Hellman(DDH)假设下,论文通过随机预言模型证明了CPK-SC的安全性。
  • Zheng Y. Digital signcryption or how to achieve cost(signature encryption) cost (signature)+cost(encryption)[C][J].Advances in Cryptology-Crypto9.1997, LNCS 1294:165-179[2]Malone-Lee J. Identity based signcryption. cryptology ePrintarchive[R]. Report 2002/098, IACR, 2002.[3]南湘浩, 陈钟. 网络安全技术概论. 北京: 国防工业出版社,2003, 第2 章.Nan Xiang-hao and Chen Zhong. A Profile to NetworkSecurity Techniques[M]. Beijing: National Defence IndustryPress, 2003, Chapter 2.[4]Chen H Y, L S W, and Liu Z H, et al.. An identity-basedsigncryption scheme with short ciphertext from pairings[C].Emerging Directions in Embedded and UbiquitousComputing workshops 2006, 2006, LNCS 4097: 342-351.[5]Barbosa M and Farshim P. Certificateless signcryption[C].ACM Symposium on Information, Computer andCommunications Security, Tokyo, Japan. ACM, 2008:369-372.[6]Li F and Yu Y. An efficient and provably secure ID-basedthreshold signcryption scheme[C]. International conferenceon communications, circuits and systems. Xiamen, China,2008: 488-492.[7]Ren Y L and Gu D W. Efficient identity based signature/signcryption scheme in the standard model[C]. The 1thInternational Symposium on Data, Privacy and E-Commerce.Chengdu, China, 2007: 133-137.[8]Libert B and Quisquater J J. New identity based signcryptionschemes from pairings[C]. IEEE Information TheoryWorkshop. Paris, France, 2003: 155-158.[9]Ma C S. Efficient short signcryption scheme with publicverifiability[C]. Inscrypt 2006, 2006, LNCS 4318: 118-129.[10]Chen Y G.[J].Jia C F, and L S W, et al.. Signature schemewith arbitrary length message recovery in combined publickey[C]. The 4th International conference on Mobile Ad-hocand Sensor Networks. Wuhan, China.2008,:-[11]Zhong X, Dai G Z, and Yang D M. An efficient online/offlinesigncryption scheme for MANET [C]. IEEE AdvancedInformation Networking and Applications Workshops.Ontario, Canada, 2007: 171-176.
  • 加载中
计量
  • 文章访问数:  3623
  • HTML全文浏览量:  104
  • PDF下载量:  858
  • 被引次数: 0
出版历程
  • 收稿日期:  2008-09-08
  • 修回日期:  2009-01-12
  • 刊出日期:  2009-07-19

目录

    /

    返回文章
    返回