计算机科学 ›› 2015, Vol. 42 ›› Issue (3): 106-110.doi: 10.11896/j.issn.1002-137X.2015.03.022
于志敏,景征骏,古春生
YU Zhi-min, JING Zheng-jun and GU Chun-sheng
摘要: 提出了基于多线性映射的环签密广播方案,环成员代表环群体匿名签密并广播给多个接收者。其具有两个用户群之间环签密通信的功能。该方案满足环签密广播的安全要求,能够保证签密所传输消息的保密性、签密的不可伪造性、签密者的匿名性。在随机预言模型下,把方案的安全性归约到分级Diffie-Hellman判定问题(GDDH)进行求解。
[1] Rivest R L,Shamir A,Tauman Y.How to leak a secret[C]∥Advances in Cryptology-ASIACRYPT 2001.Berlin:Springer-Verlag,2001:552-565 [2] Zheng Yu-liang.Digital signcryption or how to achieve cost(signature&encryption)< [4] Huang X Y,Zhang F T,Wu W.Identity-based ring signcryption scheme[J].Tien Tzu Hsueh Pao/Acta Electronica Sinica,2006,4(2):263-266 [5] Selvi S S D,Vivek S S,Rangan C P.On the security of identity based ring signcryption schemes[C]∥Information Security,12th International Conference(ISC 2009).Berlin:Springer-Verlag,2009:310-325 [6] Deng Lun-zhi,Liu Cheng-lian,Wang Xiang-bin.An ImprovedIdentity-Based Ring Signcryption Scheme[J].Information Security Journal:A Global Perspective,2013,22(1):46-54 [7] Sharmila D S S,Sree V S,Pandu R C.Identity based ring signcryption schemes revisited[J].Journal of Math-for-Industry,2011,3(A3):33-46 [8] Zhang Bo,Xu Qiu-liang.An ID-based anonymous signcryptionscheme for multiple receivers secure in the standard model:Advances in Computer Science and Information Technology[C]∥AST/UCMA/ISA/ACN 2010 Conferences.Berlin:Springer-Verlag,2010:15-27 [9] 鲁力,胡磊.基于Weil对的多接收者公钥加密方案[J].软件学报,2008,9(8):2159-2166 [10] 庞辽军,高璐,裴庆祺,等.基于身份公平的匿名多接收者签密方案[J].通信学报,2013,4(8):161-168 [11] 李慧贤,陈绪宝,巨龙飞,等.改进的多接收者签密方案[J].计算机研究与发展,2013,0(7):1418-1425 [12] Shor P W.Polynomial-time algorithms for prime factorizationand discrete logarithms on a quantum computer[J].SIAM J Comput,1997,26(5):1484-1509 [13] Boneh D,Silverberg A.Applications of multilinear forms tocryptography[J].Contemporary Mathematics,2003,324:71-90 [14] Garg S,Gentry C,Halevi S.Candidate multilinear maps fromideal lattices[C]∥Advances in Cryptology(EUROCRYPT 2013).Berlin:Springer-Verlag,2013:1-17 [15] Coron J-S,de Lepoint T,Tibouchi M.Practical multilinear maps over the integers[C]∥Advances in Cryptology(CRYPTO 2013).Berlin:Springer-Verlag,2013:476-493 [16] Hohenberger S,Sahai A,Waters B.Full domain hash from (le-veled) multilinear maps and identity-based aggregate signatures [EB/OL].2013-7.http://eprint.iacr.org/2013/434.pdf |
No related articles found! |
|