计算机科学 ›› 2014, Vol. 41 ›› Issue (11): 208-211.doi: 10.11896/j.issn.1002-137X.2014.11.041

• 信息安全 • 上一篇    下一篇

一种有效的无证书环签密方案

孙华,孟坤   

  1. 安阳师范学院计算机与信息工程学院 安阳455000;清华大学计算机科学与技术系 北京100084
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(U1204402),河南省科技厅科技攻关计划项目(112102210370),河南省教育厅科学技术研究重点项目(14A413014)资助

Efficient Certificateless Ring Signcryption Scheme

SUN Hua and MENG Kun   

  • Online:2018-11-14 Published:2018-11-14

摘要: 环签密是一个重要的密码学术语,它结合了加密和环签名的功能,具有保密性、可认证性和匿名性等安全属性。目前已有的无证书环签密方案大都是在随机预言模型下提出的,然而在该模型下可证安全的方案在哈希函数实例化后有时却并不安全。针对这一问题,设计了一个标准模型下可证安全的无证书环签密方案,并通过计算Diffie-Hellman (CDH)困难问题假设和判定性Diffie-Hellman (DBDH)困难问题假设,证明了方案满足适应性选择密文攻击下的不可区分性以及适应性选择消息攻击下存在的不可伪造性,因而方案是安全有效的。

关键词: 环签密,无证书公钥密码体制,CDH问题,DBDH问题

Abstract: Ring signcryption is an important cryptographic primitive which combines the functions of encryption and ring signature.It can provide confidentiality,authenticity and anonymity simultaneously.At present,most of existing certificateless ring signcryption schemes are proposed in the random oracle,however,they sometimes are proven to be insecure when the hash functions are instantiated.Aiming at this problem,a certificateless ring signcryption scheme was put forward without random oracles in this paper.Meanwhile,it was proven that this scheme satisfies indistinguishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen message attacks under the computational Diffie-Hellman assumption and decisional Diffie-Hellman assumption,so the scheme is secure and reliable.

Key words: Ring signcryption,Certificateless public key cryptography,CDH problem,DBDH problem

[1] Al-Riyami S S,Paterson K G.Certificateless public key cryptog-raphy[C]∥Proceedings of ASIACRYPT 2003.Berlin:Springer-Verlag,2003:452-473
[2] Waters B.Efficient identity-based encryption without randomoracles[C]∥Proceedings of EUROCRYPT 2005.Berlin:Springer-Verlag,2005:114-127
[3] Gentry C.Practical identity-based encryption without randomoracles[C]∥Proceedings of EUROCRYPT 2006.Berlin:Springer-Verlag,2006:445-464
[4] Zheng Y L.Digital signcryption or how to achieve cost(signature & encryption) << cost(signature)+cost(encryption)[C]∥Proceedings of CRYPTO 1997.Berlin:Springer-Verlag,1997:165-179
[5] Rivest R L,Shamir A,Tauman Y.How to leak a secret[C]∥Proceedings of ASIACRYPT 2001.Berlin:Springer-Verlag,2001:552-565
[6] Huang X Y,Susilo W,Mu Y,et al.Identity-based ring signcryption schemes:cryptographic primitives for preserving privacy and authenticity in the ubiquitous world[C]∥Proceedings of the 19th International Conference on Advanced Information Networking and Applications.Washington DC,IEEE Computer Society,2005:649-654
[7] Zhang M,Yang B,Zhu S,et al.Efficient secret authenticatableanonymous signcryption scheme with identity privacy[C]∥Proceedings of Intelligence and Security Informatics(ISI 2008).Berlin:Springer-Verlag,2008:126-137
[8] Li F G,Masaaki S,Tsuyoshi T.Analysis and improvement of authenticatable ring signcryption scheme[J].Journal of Shanghai Jiaotong University(Science),2008,13(6):679-683
[9] Zhun L J,Zhang F T.Efficient id-based ring signature and ring signcryption schemes[C]∥Proceedings of CIS 2008.IEEE Press,2008:303-307
[10] Zhu Z C,Zhang Y Q,Wang F J.An efficient and provable secure identity-based ring signcryption scheme[J].Computer Standards & Interfaces,2009,31(6):1092-1097
[11] Sharmila D S S,Sree V S,Pandu R C.On the security of identity based ring signcryption schemes[C]∥Proceedings of ISC 2009.Berlin:Springer-Verlag,2009:310-325
[12] Zhao Z M,Yu T,Ren X F.Efficient identity-based ring sign-cryption scheme in the standard model[EB/OL].[2013-03-20].http://www.joics.com/publishedpapers/2013_10_5_1471_1478.pdf
[13] Sun H,Wang A M,Zheng X F.Provably secure identity-based threshold ring signcryption scheme in standard model[J].Computer Science,2013,40(5):131-135
[14] Zhu L J,Zhang F T,Miao S Q.A provably secure parallel certifi-cateless ring signcryption scheme[C]∥Proceedings of 2010 International Conference on Multimedia Information Networking and Security.IEEE Press,2010:423-427
[15] Qi Z H,Yang G,Ren X Y.Provably secure certificateless ring signcryption scheme[J].China Communications,2011,8(3):99-106
[16] Qin H S,Zhang L,Feng Y Q,et al.Certificateless ring signcryption scheme without paring design[J].Computer Engineering and Design,2013,34(3):841-844

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!