计算机科学 ›› 2013, Vol. 40 ›› Issue (11): 112-116.

• 信息安全 • 上一篇    下一篇

一种可证明安全的有效无证书签密方案

孙华,郑雪峰   

  1. 安阳师范学院计算机与信息工程学院 安阳455000;北京科技大学计算机与通信工程学院 北京100083
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金资助

Provably Secure and Efficient Certificateless Signcryption Scheme

SUN Hua and ZHENG Xue-feng   

  • Online:2018-11-16 Published:2018-11-16

摘要: 无证书密码体制消除了基于身份密码系统中固有的密钥托管问题,同时又克服了传统公钥密码系统中复杂的证书管理问题,它具有两者的优点。签密是一个通过数字签名和公钥加密而同时实现认证和保密的密码学原语,而它却比分别签名和加密具有更低的计算量。提出了一种可证安全的无证书签密方案,其只在解签密阶段需要两个双线性对计算,因而具有较高的效率。最后,在随机预言模型下利用困难问题假设证明了方案满足适应性选择密文攻击下的不可区分性以及适应性选择消息和身份攻击下的存在不可伪造性。

关键词: 无证书密码体制,签密,可证明安全,随机预言模型

Abstract: Certificateless cryptography eliminates the key escrow problem inherent in identity-based cryptosystems and avoids the complex certificate managerment problem in traditional certificate-based public-key cryptosystems,so it achieves the best advantages of them.Signcryption is a cryptographic primitive that could achieve authentication and confidentiality simultaneously by combining digital signature and public key encryption,while it has lower computational cost than signing and encryption respectively.In this paper,a provably secure certificateless signcryption scheme was proposed,which requires only two bilinear pairing operation in the unsigncryption phase and is much more efficient than the existing ones.In the last,we proved it satisfies indistinguishability against adaptive chosen ciphertext attack and existential unforgeability against adaptive chosen message and identity attack by using the complexity assumptions in the random oracle model.

Key words: Certificateless cryptography,Signcryption,Provable security,Random oracle model

[1] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceedings of CRYPTO 1984,LNCS 196.Berlin:Sprin-ger-Verlag,1985:47-53
[2] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]∥Proceedings of ASIACRYPT 2003,LNCS 2894.Berlin:Springer-Verlag,2003:452-473
[3] Zheng Yu-liang.Digital signcryption or how to achieve cost(signature & encryption)< [4] An J H,Dodis Y,Rabin T.On the security of joint signature andencryption[C]∥Proceedings of EUROCRYPT 2002,LNCS 2332.Berlin:Springer-Verlag,2002:83-107
[5] Baek J,Steinfeld R,Zheng Yu-liang.Formal proofs for the security of signcryption[J].Journal of Cryptology,2007,20(2):203-235
[6] Barbosa M,Farshim P.Certificateless signcryption[C]∥ Proceedings of ASIACCS 2008.ACM,New York,2008:369-372
[7] Aranha D,Castro R,Lopez J,et al.Efficient certificateless signcryption[EB/OL].http://labcom.inf.ufrgs.br/labcom/ceseg/anais/2008/data/pdf/st03_01_resumo.pdf
[8] Wu Chen-huang,Cheng Zhi-xiong.A new efficient certificateless signcryption scheme[C]∥Proceedings of ISISE 2008.IEEE Computer Society,2008:661-664
[9] Selvi S S D,Vivek S S,Rangan C P.Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing[EB/OL].Cryptology ePrint Archive,2009.http://eprint.iacr.org/2009/298
[10] Selvi S S D,Vivek S S,Shukla D,et al.Efficient and provably secure certificateless multi-receiver signcryption[C]∥Proceedings of ProvSec 2008,LNCS 5324.Berlin:Springer-Verlag,2008:52-67
[11] Xie Wen-jian,Zhang Zhang.Efficient and provably secure certifi-cateless signcryption from bilinear maps[C]∥Proceedings of WCNIS 2010.IEEE Press,2010:558-562
[12] Barreto P S L M,Libert B,Mccullagh N,et al.Efficient and provably-secure identity-based signatures and signcryption from bilinear maps[C]∥Proceedings of ASIACRYPT 2005,LNCS 3788.Berlin:Springer-Verlag,2005:515-532
[13] Chen Yan,Zhang Fu-tai.A new certificateless public key en-cryption scheme[J].Wuhan University Journal of Natural Sciences,2008,13(6):721-726
[14] Selvi S S D,Vivek S S,Rangan C P.Security weaknesses in two certificateless signcryption schemes[EB/OL].Cryptology ePrint Archive,2010.http://eprint.iacr.org/2010/092
[15] Liu Zhen-hua,Hu Yu-pu,Zhang Xiang-song,et al.Certificateless signcryption scheme in the standard model[J].Information Sciences,2010,180(3):452-464
[16] Weng Jian,Yao Guo-xiang,Deng R H,et al.Cryptanalysis of a certificateless signcryption scheme in the standard model[J].Information Sciences,2011,181(3):661-667
[17] Li Peng-cheng,He Ming-xing,Li Xiao,et al.Efficient and prova-bly secure certificateless signcryption from bilinear pairings[J].Journal of Computational Information Systems,2010,6(11):3643-3650
[18] Du Hong-zhen,Wen Qiao-yan.Efficient and provably-securecertificateless short signature scheme from bilinear pairings[J].Computer Standards and Interfaces,2009,31(2):390-394
[19] Javier H,German S.Forking lemmas for ring signature schemes[C]∥Proceedings of INDOCRYPT 2003,LNCS 2904.Berlin:Springer-Verlag,2003:266-279

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!