计算机科学 ›› 2015, Vol. 42 ›› Issue (3): 106-110.doi: 10.11896/j.issn.1002-137X.2015.03.022

• 信息安全 • 上一篇    下一篇

基于多线性映射的环签密广播公钥方案

于志敏,景征骏,古春生   

  1. 江苏理工学院计算机工程学院 常州213001,江苏理工学院计算机工程学院 常州213001;南京邮电大学计算机学院 南京210003,江苏理工学院计算机工程学院 常州213001;中国科学技术大学计算机科学与技术学院 合肥230027
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受江苏省普通高校研究生科研创新计划(CXZZ13_0493),江苏省属高校自然科学基金(13KJB520005),江苏省“青蓝工程”(KYQ14004),江苏理工学院面上项目(KYY14007),常州市云计算与智能信息处理重点实验室2014年开放基金项目资助

Ring Signcryption Broadcasting Scheme Based on Multilinear Maps

YU Zhi-min, JING Zheng-jun and GU Chun-sheng   

  • Online:2018-11-14 Published:2018-11-14

摘要: 提出了基于多线性映射的环签密广播方案,环成员代表环群体匿名签密并广播给多个接收者。其具有两个用户群之间环签密通信的功能。该方案满足环签密广播的安全要求,能够保证签密所传输消息的保密性、签密的不可伪造性、签密者的匿名性。在随机预言模型下,把方案的安全性归约到分级Diffie-Hellman判定问题(GDDH)进行求解。

关键词: 环签密,多线性映射,保密性,不可伪造性,匿名性,GDDH

Abstract: We proposed a ring signcryption scheme based on multilinear maps.Each ring member can represent ring group to generate anonymous signcryption and broadcast it to multiple recipients.Ring signcryption can be communicated between two ring groups.The scheme meets the security requirements of ring signcryption broadcasting like the confidentiality of messages,unforgeability and anonymity.In the random oracle model,the security of the scheme is reduced to grading decisional Diffie-Hellman problem (GDDH) to solve.

Key words: Ring signcryption,Multilinear maps,Confidentiality,Unforgeability,Anonymity,GDDH

[1] Rivest R L,Shamir A,Tauman Y.How to leak a secret[C]∥Advances in Cryptology-ASIACRYPT 2001.Berlin:Springer-Verlag,2001:552-565
[2] Zheng Yu-liang.Digital signcryption or how to achieve cost(signature&encryption)< [3] 孙华,王爱民,郑雪峰.标准模型下可证安全的基于身份的门限环签密方案[J].计算机科学,2013,0(5):131-135
[4] Huang X Y,Zhang F T,Wu W.Identity-based ring signcryption scheme[J].Tien Tzu Hsueh Pao/Acta Electronica Sinica,2006,4(2):263-266
[5] Selvi S S D,Vivek S S,Rangan C P.On the security of identity based ring signcryption schemes[C]∥Information Security,12th International Conference(ISC 2009).Berlin:Springer-Verlag,2009:310-325
[6] Deng Lun-zhi,Liu Cheng-lian,Wang Xiang-bin.An ImprovedIdentity-Based Ring Signcryption Scheme[J].Information Security Journal:A Global Perspective,2013,22(1):46-54
[7] Sharmila D S S,Sree V S,Pandu R C.Identity based ring signcryption schemes revisited[J].Journal of Math-for-Industry,2011,3(A3):33-46
[8] Zhang Bo,Xu Qiu-liang.An ID-based anonymous signcryptionscheme for multiple receivers secure in the standard model:Advances in Computer Science and Information Technology[C]∥AST/UCMA/ISA/ACN 2010 Conferences.Berlin:Springer-Verlag,2010:15-27
[9] 鲁力,胡磊.基于Weil对的多接收者公钥加密方案[J].软件学报,2008,9(8):2159-2166
[10] 庞辽军,高璐,裴庆祺,等.基于身份公平的匿名多接收者签密方案[J].通信学报,2013,4(8):161-168
[11] 李慧贤,陈绪宝,巨龙飞,等.改进的多接收者签密方案[J].计算机研究与发展,2013,0(7):1418-1425
[12] Shor P W.Polynomial-time algorithms for prime factorizationand discrete logarithms on a quantum computer[J].SIAM J Comput,1997,26(5):1484-1509
[13] Boneh D,Silverberg A.Applications of multilinear forms tocryptography[J].Contemporary Mathematics,2003,324:71-90
[14] Garg S,Gentry C,Halevi S.Candidate multilinear maps fromideal lattices[C]∥Advances in Cryptology(EUROCRYPT 2013).Berlin:Springer-Verlag,2013:1-17
[15] Coron J-S,de Lepoint T,Tibouchi M.Practical multilinear maps over the integers[C]∥Advances in Cryptology(CRYPTO 2013).Berlin:Springer-Verlag,2013:476-493
[16] Hohenberger S,Sahai A,Waters B.Full domain hash from (le-veled) multilinear maps and identity-based aggregate signatures [EB/OL].2013-7.http://eprint.iacr.org/2013/434.pdf

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!