计算机科学 ›› 2013, Vol. 40 ›› Issue (5): 131-135.

• 信息安全 • 上一篇    下一篇

标准模型下可证安全的基于身份的门限环签密方案

孙华,王爱民,郑雪峰   

  1. 安阳师范学院计算机与信息工程学院 安阳455000;安阳师范学院计算机与信息工程学院 安阳455000;北京科技大学计算机与通信工程学院 北京100083
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金资助

Provably Secure Identity-based Threshold Ring Signcryption Scheme in Standard Model

SUN Hua,WANG Ai-min and ZHENG Xue-feng   

  • Online:2018-11-16 Published:2018-11-16

摘要: 签密是一个能够同时提供认证性和保密性的密码学术语,而它却比分别签名和加密具有更低的计算成本。环签密除具有签密的一般属性外,还具有匿名性。为了设计基于身份的门限环签密方案,利用秘密共享和双线性对技术, 提出了一种标准模型下基于身份的门限环签密方案,并对方案的安全性进行了分析。最后,通过计算Diffie-Hellman问题和判定性Diffie-Hellman问题的困难性,证明了该方案在适应性选择消息和身份攻击下的不可伪造性以及在适应性选择密文攻击下的不可区分性。

关键词: 门限环签密,双线性对,计算Diffie-Hellman问题,判定性Diffie-Hellman问题,基于身份的密码学

Abstract: Signcryption is a cryptographic primitive which can provide authentication and confidentiality simultaneously with a computational cost lower than signing and encryption respectively,while the ring signcryption has anonymity in addition to authentication and confidentiality.In order to design an identity-based threshold ring signcryption,this paper presented an efficient identity-based threshold ring signcryption scheme without random oracles by means of secret sharing and bilinear pairing technique,and gave security analysis of the scheme.At last,we proved this scheme satisfies indistinguishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen message and identity attacks in terms of the hardness of DBDH problem and CDH problem.

Key words: Threshold ring signcryption,Bilinear pairing,Computational Diffie-Hellman problem,Decisional bilinear Diffie-Hellman problem,Identity based cryptography

[1] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceedings of Crypto 1984.volume 196of LNCS,1984:47-53
[2] Boneh D,Franklin M.Identity-based encryption from the Weil pairing[C]∥Proceedings of Crypto 2001.volume 2139of LNCS,2001:213-229
[3] Florian Hess.Efficient identity based signature schemes basedon pairings[C]∥Proceedings of SAC 2002.volume 2595of LNCS,2002:310-324
[4] Paterson K G,Schuldt J C N.Efficient identity-based signatures secure in the standard model[C]∥Proceedings of ACISP 2006.volume 4058of LNCS,2006:207-222
[5] Zheng Yu-liang.Digital signcryption or how to achieve cost(signature & encryption)cost(signature)+cost(encryption) [C]∥Advances in Cryptology-Crypto 1997.volume 1294of LNCS,Springer-Verlag,1997:165-179
[6] Duan S S,Cao Z F,Lu R X.Robust id-based threshold signcryption scheme from pairings[C]∥Proceedings of the 3rd International Conference on Information Security.ACM,2004:33-37
[7] Peng C G,Li X.An identity-based threshold signcryption sch-eme with semantic security[C]∥Proceedings of CIS 2005.volume 3802of LNCS,Springer-Verlag,2005:173-179
[8] Li F G,Yu Y.An efficient and provably secure id-based thre-shold signcryption scheme[C]∥Proceedings of ICCCAS 2008.IEEE Press,2008:488-492
[9] Zhu Z C,Zhang Y Q,Wang F J.The analysis of an efficient and provably secure id-based threshold signcryption scheme and its secure version[C]∥Proceedings of the Second International Conference on Provable Security.volume 5324of LNCS,Springer Verlag,2008:210-225
[10] Huang Xin-yi,Susilo W,Mu Yi,et al.Identity-based ring signcryption schemes:cryptographic primitives for preserving privacy and authenticity in the ubiquitous world[C]∥Proceedings of the 19th International Conference on Advanced Information Networking and Application 2005.volume 2,2005:649-654
[11] Zhang M W,Yang B,Zhu S L,et al.Efficient secret authenticata-ble anonymous signcryption scheme with identity privacy[C]∥Proceedings of IEEE ISI 2008.volume 5075of LNCS,Springer-Verlag,2008:126-137
[12] Zhun L J,Zhang F T.Efficient id-based ring signature and ring signcryption schemes[C]∥Proceedings of CIS 2008.IEEE Press,2008:303-307
[13] Zhu Z C,Zhang Y Q,Wang F J.An efficient and provable secure identity-based ring signcryption scheme[J].Computer Standards & Interfaces,2009,31:1092-1097
[14] Sharmila Deva Selvi S,Sree Vivek S,Pandu Rangan C.On the security of identity based ring signcryption schemes [C]∥Proceedings of the 12th International Conference on Information Security.volume 5735of LNCS,Springer-Verlag,2009:310-325
[15] 罗大文,何明星,李虓.基于身份的门限环签密方案[J].计算机工程与应用,2011,47(33):65-67

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!