计算机科学 ›› 2015, Vol. 42 ›› Issue (5): 165-168.doi: 10.11896/j.issn.1002-137X.2015.05.033

• 信息安全 • 上一篇    下一篇

基于身份的跨信任域签密方案

张 雪,冀会芳,李光松,韩文报   

  1. 信息工程大学数学工程与先进计算国家重点实验室 郑州450002,信息工程大学数学工程与先进计算国家重点实验室 郑州450002,信息工程大学数学工程与先进计算国家重点实验室 郑州450002,信息工程大学数学工程与先进计算国家重点实验室 郑州450002
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金资助

Identity-based Signcryption Cross Autonomous Domains

ZHANG Xue, JI Hui-fang, LI Guang-song and HAN Wen-bao   

  • Online:2018-11-14 Published:2018-11-14

摘要: 实际网络环境尤其是未来异构网络融合环境中,各个信任域大多都是独立的自治域,使用不同的系统参数。为此提出了一种新的基于身份的跨信任域签密方案,该方案对PKG系统参数不作限制,各PKG可以使用完全不同的系统公开参数、不同的主密钥和公钥。并且在该签密协议的基础上给出了会话密钥的生成方法。在随机预言模型中给出了安全性证明,在BDH问题是困难的的假设下该协议是安全的,其满足机密性、不可伪造性、不可否认性和公开验证性。在与其他跨信任域签密方案计算开销相当的情况下,该方案不仅实现了跨信任域签密,而且对各PKG参数不作限制。

关键词: 基于身份,签密,跨信任域,密钥协商

Abstract: Real networks especially heterogeneous networks consist of several cooperating sub-networks which belong to different trust domains which are independent and autonomous.The trust domains are maintained by different PKGs.A novel ID-based cross-domain signcryption scheme was proposed which is no restriction on PKG system parameters so that public system parameters,system master keys and system public keys can be totally different.Based upon this signcryption scheme,a cross-domain session key generation scheme was presented.Our cross-doamin signcryption protocol was proved to be secure in the random oracle model assuming the bilinear Diffle-Hellman problem is hard.It satisfies the basic security requirements confidentiality,unforgeability,non-repudiation and public verifiability.The scheme not only achieves cross-domain signcryption,but also makes no restriction on PKG system parameters on condition that computation overheads are little increased.

Key words: Identity-based,Signcryption,Cross-domain,Key agreement

[1] Adi S.Identity-based cryptosystems and signature schemes [C]∥Advances in Crypto’84.Springer-Verlag,1984:47-53
[2] Dan B,Matt F.Identity based encryption from the Weil paring [C]∥Advances in Crypto’01.Springer-Verlag,2001:213-229
[3] Zheng Yu-liang.Digital Signcryption or How to Achieve Cost(Signature & Encryption)< [4] Malone-Lee John.Identity-based signcryption [R].Cryptology ePrint Achive,Report 2002/098
[5] Hess Florian.Efficient identity based signature scheme based on Parings[C]∥Proceeding of the 9th Workshop on Selective Areas on Cryptography (SAC 2002).Springer-Verlag,2002,2595
[6] 路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-581
[7] Li Fa-gen,HuYu-pu,Zhang Chuan-rong.An identity based signcryption scheme for multi-domain Ad Hoc Networks[C]∥Proceeding of ACNS 2007.2007,4521:373-384
[8] Sunder L,Prashant K.Multi-PKG based signcryption [R].Cryptology ePrint Archive,Report 2008/050
[9] 张红旗,张文波,等.网格环境下基于身份的跨域认证研究[J].计算机工程,2009,35(17):160-162
[10] 朱重,吴国新.分布式多信域管理技术研究综述[J].计算机科学,2011,38(4):38-92

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!