全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

可信模块隐私保护的自证明签密方案

DOI: 10.13190/jbupt.200901.60.zhangmw, PP. 60-64

Keywords: 可信平台模块,签密,可信计算,隐私保护,自证明方案

Full-Text   Cite this paper   Add to My Lib

Abstract:

提出可信模块间安全通信的一种高效的基于自证明公钥的签密方案IDTSC,它可以抵抗不诚实CA的消息伪造攻击和共谋攻击,且中间人在获得密文后如果没有接收方密钥则无法知道和验证密文的签密者和接收者,实现密文的匿名性。给出了系统模型并证明了其安全性,包括语义安全性、不可伪造性、密文匿名性和不诚实CA的可追踪性。方案可应用于要求身份隐藏和身份隐私保护的安全传输环境。与其它相似方案比较,IDTSC方案有更强的安全性和更高的计算效率。

References

[1]  Sevin P E, Strasser M, Basin D. Securing the distribution and storage of secrets with trusted platform modules//WISTP07, LNCS 4462. Berlin: Springer-Verlag, 2007: 53-66.
[2]  Boneh D, Lynn B, Shacham H, Short signatures from the weil pairings//Advances in Cryptology - Asiacrypt'01, LNCS 2248. Berlin: Springer-Verlag, 2001: 514-532.
[3]  侍伟敏, 钮心忻, 杨义先. 多证明签名方案及在交叉认证中的应用[J]. 北京邮电大学学报, 2006, 29(2): 22-25. Shi Weimin, Niu Xinxin, Yang Yixian. Multi-certification signature scheme and its application to cross certification[J]. Journal of Beijing University of Posts and Telecommunications, 2006, 29(2): 22-25.
[4]  Shao Zuhua. Self-certified signature scheme from pairings[J]. The Journal of Systems & Software, 2007, 80(3): 388-395.
[5]  杜红珍, 温巧燕. 高效的短签密方案[J]. 北京邮电大学学报, 2008, 31(1): 84-87. Du Hongzhen, Wen Qiaoyan. Efficient short signcryption scheme[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(1): 84-87.
[6]  李发根, 胡予濮, 李刚. 一个高效的基于身份的签密方案[J]. 计算机学报, 2006, 26(9): 1641-1647. Li Fagen, Hu Yupu, Li Gang. An efficient identity-based signcryption scheme. Chinese Journal of Computers, 2006, 26(9): 1641-1647.
[7]  Yang Guomin, Wong Duncan, Deng Xiaotie. Analysis and improvement of a signcryption scheme with key privacy//ISC 2005, LNCS 3650. Berlin: Springer-Verlag, 2005: 218-232.
[8]  Chik How Tan. Analysis of improved signcryption scheme with key privacy[J]. Information Processing Letters, 2006, 99(4): 135-138.
[9]  Chung Ki Li, Yang Guomin, Wong Duncan, et al. An efficient signcryption scheme with key privacy//EuroPKI 2007, LNCS 4582. Berlin: Springer-Verlag, 2007: 78-93.
[10]  Li Fagen, Xin Xiangjun, Hu Yupu. A pairing-based signcryption scheme using self-certified public keys[J]. International Journal of Computers and Applications, 2007, 29(3): 278-282.
[11]  Sattam S Al-riyami, Kenneth G. Paterson and royal holloway, certificateless public key cryptography//Asiacrypt 2003, LNCS 2894. Berlin: Springer-Verlag, 2003: 452-473.
[12]  Lü Jiqiang, Wang Xinmei, Kim Kwangjo. Practical convertible authenticated encryption schemes using self-certified public keys[J]. Applied Mathematics and Computation, 2005, 169(2): 1285-1297.
[13]  Girault M G. Self-certified public keys//Advances in Cryptology(Proceedings of EuroCrypt'91), LNCS 547. Berlin: Springer-Verlag, 1991: 490-497.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133