计算机科学 ›› 2013, Vol. 40 ›› Issue (11): 112-116.
孙华,郑雪峰
SUN Hua and ZHENG Xue-feng
摘要: 无证书密码体制消除了基于身份密码系统中固有的密钥托管问题,同时又克服了传统公钥密码系统中复杂的证书管理问题,它具有两者的优点。签密是一个通过数字签名和公钥加密而同时实现认证和保密的密码学原语,而它却比分别签名和加密具有更低的计算量。提出了一种可证安全的无证书签密方案,其只在解签密阶段需要两个双线性对计算,因而具有较高的效率。最后,在随机预言模型下利用困难问题假设证明了方案满足适应性选择密文攻击下的不可区分性以及适应性选择消息和身份攻击下的存在不可伪造性。
[1] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceedings of CRYPTO 1984,LNCS 196.Berlin:Sprin-ger-Verlag,1985:47-53 [2] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]∥Proceedings of ASIACRYPT 2003,LNCS 2894.Berlin:Springer-Verlag,2003:452-473 [3] Zheng Yu-liang.Digital signcryption or how to achieve cost(signature & encryption)< [5] Baek J,Steinfeld R,Zheng Yu-liang.Formal proofs for the security of signcryption[J].Journal of Cryptology,2007,20(2):203-235 [6] Barbosa M,Farshim P.Certificateless signcryption[C]∥ Proceedings of ASIACCS 2008.ACM,New York,2008:369-372 [7] Aranha D,Castro R,Lopez J,et al.Efficient certificateless signcryption[EB/OL].http://labcom.inf.ufrgs.br/labcom/ceseg/anais/2008/data/pdf/st03_01_resumo.pdf [8] Wu Chen-huang,Cheng Zhi-xiong.A new efficient certificateless signcryption scheme[C]∥Proceedings of ISISE 2008.IEEE Computer Society,2008:661-664 [9] Selvi S S D,Vivek S S,Rangan C P.Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing[EB/OL].Cryptology ePrint Archive,2009.http://eprint.iacr.org/2009/298 [10] Selvi S S D,Vivek S S,Shukla D,et al.Efficient and provably secure certificateless multi-receiver signcryption[C]∥Proceedings of ProvSec 2008,LNCS 5324.Berlin:Springer-Verlag,2008:52-67 [11] Xie Wen-jian,Zhang Zhang.Efficient and provably secure certifi-cateless signcryption from bilinear maps[C]∥Proceedings of WCNIS 2010.IEEE Press,2010:558-562 [12] Barreto P S L M,Libert B,Mccullagh N,et al.Efficient and provably-secure identity-based signatures and signcryption from bilinear maps[C]∥Proceedings of ASIACRYPT 2005,LNCS 3788.Berlin:Springer-Verlag,2005:515-532 [13] Chen Yan,Zhang Fu-tai.A new certificateless public key en-cryption scheme[J].Wuhan University Journal of Natural Sciences,2008,13(6):721-726 [14] Selvi S S D,Vivek S S,Rangan C P.Security weaknesses in two certificateless signcryption schemes[EB/OL].Cryptology ePrint Archive,2010.http://eprint.iacr.org/2010/092 [15] Liu Zhen-hua,Hu Yu-pu,Zhang Xiang-song,et al.Certificateless signcryption scheme in the standard model[J].Information Sciences,2010,180(3):452-464 [16] Weng Jian,Yao Guo-xiang,Deng R H,et al.Cryptanalysis of a certificateless signcryption scheme in the standard model[J].Information Sciences,2011,181(3):661-667 [17] Li Peng-cheng,He Ming-xing,Li Xiao,et al.Efficient and prova-bly secure certificateless signcryption from bilinear pairings[J].Journal of Computational Information Systems,2010,6(11):3643-3650 [18] Du Hong-zhen,Wen Qiao-yan.Efficient and provably-securecertificateless short signature scheme from bilinear pairings[J].Computer Standards and Interfaces,2009,31(2):390-394 [19] Javier H,German S.Forking lemmas for ring signature schemes[C]∥Proceedings of INDOCRYPT 2003,LNCS 2904.Berlin:Springer-Verlag,2003:266-279 |
No related articles found! |
|