Computer Science ›› 2015, Vol. 42 ›› Issue (5): 165-168.doi: 10.11896/j.issn.1002-137X.2015.05.033

Previous Articles     Next Articles

Identity-based Signcryption Cross Autonomous Domains

ZHANG Xue, JI Hui-fang, LI Guang-song and HAN Wen-bao   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Real networks especially heterogeneous networks consist of several cooperating sub-networks which belong to different trust domains which are independent and autonomous.The trust domains are maintained by different PKGs.A novel ID-based cross-domain signcryption scheme was proposed which is no restriction on PKG system parameters so that public system parameters,system master keys and system public keys can be totally different.Based upon this signcryption scheme,a cross-domain session key generation scheme was presented.Our cross-doamin signcryption protocol was proved to be secure in the random oracle model assuming the bilinear Diffle-Hellman problem is hard.It satisfies the basic security requirements confidentiality,unforgeability,non-repudiation and public verifiability.The scheme not only achieves cross-domain signcryption,but also makes no restriction on PKG system parameters on condition that computation overheads are little increased.

Key words: Identity-based,Signcryption,Cross-domain,Key agreement

[1] Adi S.Identity-based cryptosystems and signature schemes [C]∥Advances in Crypto’84.Springer-Verlag,1984:47-53
[2] Dan B,Matt F.Identity based encryption from the Weil paring [C]∥Advances in Crypto’01.Springer-Verlag,2001:213-229
[3] Zheng Yu-liang.Digital Signcryption or How to Achieve Cost(Signature & Encryption)< [4] Malone-Lee John.Identity-based signcryption [R].Cryptology ePrint Achive,Report 2002/098
[5] Hess Florian.Efficient identity based signature scheme based on Parings[C]∥Proceeding of the 9th Workshop on Selective Areas on Cryptography (SAC 2002).Springer-Verlag,2002,2595
[6] 路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-581
[7] Li Fa-gen,HuYu-pu,Zhang Chuan-rong.An identity based signcryption scheme for multi-domain Ad Hoc Networks[C]∥Proceeding of ACNS 2007.2007,4521:373-384
[8] Sunder L,Prashant K.Multi-PKG based signcryption [R].Cryptology ePrint Archive,Report 2008/050
[9] 张红旗,张文波,等.网格环境下基于身份的跨域认证研究[J].计算机工程,2009,35(17):160-162
[10] 朱重,吴国新.分布式多信域管理技术研究综述[J].计算机科学,2011,38(4):38-92

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!