全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

标准模型下可证安全的基于身份门限签密方案

DOI: 10.13190/jbupt.201002.11.sunh, PP. 11-15

Keywords: 门限签密,标准模型,CDH问题,DBDH问题

Full-Text   Cite this paper   Add to My Lib

Abstract:

提出了一种有效的基于身份的门限签密方案.采用双线性对映射技术,基于Waters和Paterson提出的签名方案,设计了标准模型下可证安全的门限签密方案,并利用决策双线性DiffieHellman问题的困难性证明了方案的语义安全性,同时利用计算DiffieHellman问题的困难性证明了方案的不可伪造性.相对随机预言模型下的同类方案,本文方案更具有实际意义.

References

[1]  Shamir A. Identity-based cryptosystems and signature schemes//Proceedings of Crypto 1984. New York: Springer-Verlag, 1985: 47-53.
[2]  Boneh D, Franklin M. Identity-based encryption from the Weil pairing//Proceedings of Crypto 2001. Santa Barbara: Springer-Verlag, 2001: 213-229.
[3]  Gentry C. Practical identity-based encryption without random oracles//Proceedings of Eurocrypt 2006. St. Petersburg: Springer-Verlag, 2006: 445-464.
[4]  Waters B. Efficient identity-based encryption without random oracles//Proceedings of Eurocrypt 2005. Aarhus: Springer-Verlag, 2005: 114-127.
[5]  Hess F. Efficient identity based signature schemes based on pairings//Proceedings of SAC 2002. Newfoundland: Springer-Verlag, 2002: 310-324.
[6]  Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in the standard model//Proceedings of ACISP 2006. Melbourne: Springer-Verlag, 2006: 207-222.
[7]  Zheng Yuliang. Digital signcryption or how to achieve cost(signature & encryption)cost(signature)+cost(encryption)//Advances in Cryptology-Crypto 1997. California: Springer-Verlag, 1997: 165-179.
[8]  An J H, Yevgeniy Dodis, Tal Rabin. On the security of joint signature and encryption//Advances in Cryptology-Eurocrypt 2002. Netherlands: Springer-Verlag, 2002: 83-107.
[9]  Libert B, Quisquater J J. Efficient signcryption with key privacy from gap diffie-hellman groups//Proceedings of PKC 2004. Singapore: Springer-Verlag, 2004: 187-200.
[10]  Malone-Lee J. Identity-based signcryption. 2002.
[11]  Libert B, Quisquater J J. New identity based signcryption schemes from pairings. 2003. http://eprint. iacr. org/.
[12]  Duan Shanshan, Cao Zhenfu, Lu Rongxing. Robust id-based threshold signcryption scheme from pairings//Proceedings of 3rd International Conference on Information Security. Shanghai: ACM, 2004: 33-37.
[13]  Peng Changgen, Li Xiang. An identity-based threshold signcryption scheme with semantic security//Proceedings of CIS 2005. Xian: Springer-Verlag, 2005: 173-179.
[14]  Li Fagen, Yu Yong. An efficient and provably secure id-based threshold signcryption scheme//Proceedings of ICCCAS 2008. Xiamen: Springer-Verlag, 2008: 488-492.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133