计算机科学 ›› 2014, Vol. 41 ›› Issue (11): 208-211.doi: 10.11896/j.issn.1002-137X.2014.11.041
孙华,孟坤
SUN Hua and MENG Kun
摘要: 环签密是一个重要的密码学术语,它结合了加密和环签名的功能,具有保密性、可认证性和匿名性等安全属性。目前已有的无证书环签密方案大都是在随机预言模型下提出的,然而在该模型下可证安全的方案在哈希函数实例化后有时却并不安全。针对这一问题,设计了一个标准模型下可证安全的无证书环签密方案,并通过计算Diffie-Hellman (CDH)困难问题假设和判定性Diffie-Hellman (DBDH)困难问题假设,证明了方案满足适应性选择密文攻击下的不可区分性以及适应性选择消息攻击下存在的不可伪造性,因而方案是安全有效的。
[1] Al-Riyami S S,Paterson K G.Certificateless public key cryptog-raphy[C]∥Proceedings of ASIACRYPT 2003.Berlin:Springer-Verlag,2003:452-473 [2] Waters B.Efficient identity-based encryption without randomoracles[C]∥Proceedings of EUROCRYPT 2005.Berlin:Springer-Verlag,2005:114-127 [3] Gentry C.Practical identity-based encryption without randomoracles[C]∥Proceedings of EUROCRYPT 2006.Berlin:Springer-Verlag,2006:445-464 [4] Zheng Y L.Digital signcryption or how to achieve cost(signature & encryption) << cost(signature)+cost(encryption)[C]∥Proceedings of CRYPTO 1997.Berlin:Springer-Verlag,1997:165-179 [5] Rivest R L,Shamir A,Tauman Y.How to leak a secret[C]∥Proceedings of ASIACRYPT 2001.Berlin:Springer-Verlag,2001:552-565 [6] Huang X Y,Susilo W,Mu Y,et al.Identity-based ring signcryption schemes:cryptographic primitives for preserving privacy and authenticity in the ubiquitous world[C]∥Proceedings of the 19th International Conference on Advanced Information Networking and Applications.Washington DC,IEEE Computer Society,2005:649-654 [7] Zhang M,Yang B,Zhu S,et al.Efficient secret authenticatableanonymous signcryption scheme with identity privacy[C]∥Proceedings of Intelligence and Security Informatics(ISI 2008).Berlin:Springer-Verlag,2008:126-137 [8] Li F G,Masaaki S,Tsuyoshi T.Analysis and improvement of authenticatable ring signcryption scheme[J].Journal of Shanghai Jiaotong University(Science),2008,13(6):679-683 [9] Zhun L J,Zhang F T.Efficient id-based ring signature and ring signcryption schemes[C]∥Proceedings of CIS 2008.IEEE Press,2008:303-307 [10] Zhu Z C,Zhang Y Q,Wang F J.An efficient and provable secure identity-based ring signcryption scheme[J].Computer Standards & Interfaces,2009,31(6):1092-1097 [11] Sharmila D S S,Sree V S,Pandu R C.On the security of identity based ring signcryption schemes[C]∥Proceedings of ISC 2009.Berlin:Springer-Verlag,2009:310-325 [12] Zhao Z M,Yu T,Ren X F.Efficient identity-based ring sign-cryption scheme in the standard model[EB/OL].[2013-03-20].http://www.joics.com/publishedpapers/2013_10_5_1471_1478.pdf [13] Sun H,Wang A M,Zheng X F.Provably secure identity-based threshold ring signcryption scheme in standard model[J].Computer Science,2013,40(5):131-135 [14] Zhu L J,Zhang F T,Miao S Q.A provably secure parallel certifi-cateless ring signcryption scheme[C]∥Proceedings of 2010 International Conference on Multimedia Information Networking and Security.IEEE Press,2010:423-427 [15] Qi Z H,Yang G,Ren X Y.Provably secure certificateless ring signcryption scheme[J].China Communications,2011,8(3):99-106 [16] Qin H S,Zhang L,Feng Y Q,et al.Certificateless ring signcryption scheme without paring design[J].Computer Engineering and Design,2013,34(3):841-844 |
No related articles found! |
|