全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

一种新的无证书广播签密方案

DOI: doi:10.3969/j.issn.1006-7043.2011.05.017

Keywords: 广播签密, 标准模型, 可证明安全, 无证书公钥系统, 恶意但被动KGC攻击??

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了解决现有签密方案仅能够实现一对一签密与解签密的局限性,兼顾其实用性和安全性,考虑到签密方案具有效率高而传输与计算成本低的特点,结合无证书公钥体制的优势,引入了能抵抗“恶意但被动”的KGC(密钥生成中心)攻击的无证书广播签密的形式化安全模型,并提出一种新的无证书广播签密方案.该方案建立在标准模型下,能抵抗“恶意但被动”的KGC攻击,并且依赖于DBDH假设可以证明是IDN??CCA2安全的,同时依赖于CDH假设是EUF??CMA安全的,具有较高的安全性和实用性.

References

[1]  ZHENG Y. Digital signcryption or how to achieve cost (signature or encryption) cost (signature)+cost (encryption) [J]. LNCS.1294,1997: 291-312.?
[2]  AN J H, DODIS Y, RABIN T. On the security of joint signture and encryption[C]//Advances in cryptology Eurocrypt 2002.Berlin: Springer?Verlag, 2002:83-107.?
[3]  MALONE?LEE J. Identity based signcryption [EB/OL]. [2002-7-19]. Cryptologry ePrint Archive, Report 2002/098. http://eprint.iacr.org/2002/098.?
[4]  CHEN L, MALONE?LEE J. Improved identity?based signcryp? tion[C]// Proc of the 8th Int Workshop on Theory and Practice in Public Key Cryptography 2005, LNCS 3386. Berlin: Springer?Verlag, 2005:362-379.?
[5]  LIBERT B, QUISQUATER J. New identity based signcryption schemes from pairings[C]//Proceedings of the 2003 IEEE Information Theory Workshop.Pairs, France, 2003:155-158.?
[6]  FIAT A, NAOR M. Boradcast eneryption[C]//Proceedings of the 13th annual international cryptology conference on Advances in cryptology. New York: Springer?Verlag, 1993: 480-491.?
[7]  ZHAN L Y, HU Y P, MU N B.An Identity?based broadcast encryption protocol for ad hoc networks [J]. The 9th Internation Conference for Young Computer Scienilsts, 2009:1619-1623.?
[8]  DELERABLEE C, PAILLIER P. Fully collusion secure dynamic broadcast encryption with constant?size ciphertexts or decryption keys [C]//Proceedings of the first International Conference on Pairing?based Cryptography. Tokyo, Japan, 2007:39-59.?
[9]  BARBOSA M, FARSHIM P. Efficient identity?based key encapsulation to multiple parties[C]//Proceedings of Cryptography and coding, [s.l.], 2005:428-441.?
[10]  DELERABLEE C. Identity?based broadcast encryption with constant size ciphertexts and private keys [C]// Proceedings of the Advances in Crypotology 13th International Conference on Theory and Application of Cryptology and Information Security.[s.l.], 2007: 200-215.?
[11]  ASOKAN N, GINZBORG P. Key agreement in ad hoc networks[J].Computer Communication, 2000, 23(17): 162 7-1637.?
[12]  AL?RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]//LAIH C S.International Association for Cryptologic Research,[s.l.], 2003: 452-473.?
[13]  BARBOSA M, FARSHIM P. Certificateless signcryption?[C]//?ASIACCS’08. New York: ACM Press, 2008: 369-372.
[14]  BONEH D, FRANKLIN M. Identity?based encryption ?from the? Weil pairing[C]//Proceedings of the 21st Annual International Cryptology on Advanced in Cryption.London: Springer?Verlag, 2001:213-229.?
[15]  CHEN A M, LIU J. Malicous KGC attacks in certificateless cryptography [C]//ASIACCS’07. New York: ACM Press, 2007:302-311.?
[16]  CRAMER R, SHOUP V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack[C] // Proc of the Advances in Cryptology?Crypto 1998. Berlin: Springer?Verlag, 1998:13-25.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133