全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

具有撤销功能的基于身份的签密方案

DOI: 10.3969/j.issn.1006-7043.201401033

Keywords: 签密|密钥泄露|撤销|可证明安全|公开可验证

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了有效解决签密系统中撤销用户的问题, 提出了具有撤销功能的基于身份的签密方案。方案将主密钥随机分布在初始密钥和更新密钥中, 再随机生成签密密钥, 从而不仅能有效撤销用户, 而且能抵抗密钥泄露攻击。在标准模型下, 证明了该方案基于DBDH问题假设, 具有不可区分性;基于CDH问题假设, 具有不可伪造性。同时,任何第三方在不访问明文的情况下, 均可验证签密密文。

References

[1]  LIBERT B, VERGNAUD D. Adaptive-ID secure revocable identity-based encryption[C]//Topics in Cryptology-CT-RSA2009. Berlin: Springer, 2009: 1-15.
[2]  SEO J H, EMURA K. Efficient delegation of keygeneration and revocation functionalities in identity-based encryption[C]//Topics in Cryptology-CTRSA 2013. Berlin: Springer, 2013: 343-358.
[3]  SEO J H, EMURA K. Revocable identity-based encryption revisited: security model and construction[C]//Public-Key Cryptography-PKG2013. Berlin:Springer, 2013: 216-234.
[4]  ZHENG Y L. Digital signcryption or how to achieve cost(signature and encryption) << cost(signature) + cost(encryption)[C]//Advances inCryptology―CRYPTO’97. Berlin: Springer, 1997: 165-179.
[5]  GOYAL V. Certificate revocation using fine grained certificate space partitioning[C]//Financia Cryptography and Data Security.Berlin: Springer, 2007: 247-259.
[6]  BONEH D, FRANKLIN M. Identity-based encryption from the weil pairing[C]//Advances in Cryptology-CRYPTO 2001. Berlin: Springer, 2001: 213-229.
[7]  BOLDREVA A, GOYAL V, KUMER V. Identity-based encryption with efficient revocation [C]//Proceedings of the 15th ACM Conference on Computer and Communications Security. Berlin: Springer, 2008: 417-426.
[8]  锁琰, 李晓辉, 徐小岩, 等. 一种安全的分布式群签名方案[J]. 哈尔滨工程大学学报, 2011, 32(12): 1594-1623.SUO Yan, LI Xiaohui, XU Xiaoyan, et al. A secure distributed group signature scheme[J]. Journal of Harbin Engineering University, 2011, 32(12): 1594-1623.
[9]  TSAI T T, TSENG Y M, WU T Y. Provably secure revocable ID-based signature in the standard model[J].Security and Communication Networks, 2013, 6(6): 669-796.
[10]  WU T Y, TSAI T T, TSENG Y M. A revocable ID-based signcryption scheme[J].Information Hiding and Multi-media Signal Processing, 2012, 3(3): 240-251.
[11]  SELVI S S D, VIVEK S S, VINAYAGAMURTHY D, et al. ID based signcryption scheme in standard model[C]//Provable Security. Berlin: Springer, 2012: 35-52.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133