计算机科学 ›› 2013, Vol. 40 ›› Issue (10): 139-143.

• 信息安全 • 上一篇    下一篇

改进的无双线性对的无证书签密方案

周才学,王飞鹏   

  1. 九江学院信息科学与技术学院 九江332005;九江学院信息科学与技术学院 九江332005
  • 出版日期:2018-11-16 发布日期:2018-11-16

Improved Certificateless Signcryption Scheme without Pairing

ZHOU Cai-xue and WANG Fei-peng   

  • Online:2018-11-16 Published:2018-11-16

摘要: 对一个无双线性对的无证书签密方案进行了密码学分析,指出该方案不满足机密性和不可伪造性,并指出其安全证明中的错误之处,然后对其进行了改进。在随机预言机模型中,基于计算Diffie-Hellman问题和离散对数问题,证明了改进方案具有机密性和不可伪造性。效率分析表明,改进方案是高效的。

关键词: 无证书签密,保密性,不可伪造性,双线性对,随机预言机模型

Abstract: A certificateless signcryption scheme without pairing was analyzed.This paper showed the scheme can not achieve confidentiality and unforgeability.The mistakes in the security proofs were pointed out,and an improved scheme was proposed.The improved scheme was proved to be confidential under the computational diffie-hellman(CDH) assumption and existentially unforgeable under the discrete logarithm(DL) assumption in random oracle model(ROM).Performance analysis shows the improved scheme is of high efficiency.

Key words: Certificateless signcryption,Confidentiality,Unforgeability,Bilinear pairings,Random oracle model

[1] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceeding of Crypto’84.LNCS 196,Berlin:Springer-Verlag,1984:47-53
[2] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]∥Proceeding of ASIACRYPT 2003.LNCS 2894,Berlin:Springer-Verlag,2003:452-473
[3] 于刚,韩文报.具有代理解签密功能的无证书签密方案[J].计算机学报,2011,34(7):1291-1299
[4] Yang Guo-min,Tan C H.Certificateless cryptography with KGC trust level 3[J].Theoretical Computer Science,2011,412(39):5446-5457
[5] Barbosa M,Farshim P.Certificateless signcryption[C]∥Proceeding of ASIACCS’2008.ACM,2008:369-372
[6] Zheng Yu-liang.Digital signcryption or how to achieve cost(signature and encryption)< [7] Aranha D,Castro R,Lopez J,et al.Efficient certificateless signcryption [EB/OL].http://sbseg2008.inf.ufrgs.br/anais/data/pdf/st03_01_resumo.pdf,2009-03-21
[8] Wu Chen-huang,Chen Zhi-xiong.A new efficient certificateless signcryption scheme[C]∥Proceedinf of ISISE’2008.IEEE,2008:661-664
[9] Selvi S S D,Vivek S S,Rangan C P.Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing[C]∥Proceeding of Inscrypt 2009.LNCS 6151,Berlin:Springer-Verlag,2010:75-92
[10] Selvi S S D,Vivek S S,Shukla D,et al.Efficient and provably secure certificateless multi-receiver signcryption[C]∥Proceeding of ProvSec 2008.LNCS 5324,Berlin:Springer-Verlag,2008:52-67
[11] Selvi S S D,Vivek S S,Rangan C P.A note on the certificateless multi-receiver signcryption scheme[EB/OL].http://eprint.iacr.org/2009/308,2009-6-26
[12] Miao Song-qin,Zhang Fu-tai,Zhang Lei.Cryptanalysis of a certificateless multi-receiver signcryption scheme[C]∥Proceeding of MIMES 2010.IEEE,2010:593-597
[13] Li Fa-gen,Shirase M,Takagi T.Certificateless hybrid signcryption[C]∥Proceeding of ISPEC 2009.LNCS 5451,Berlin:Springer-Verlag,2009:112-123
[14] Selvi S S D,Vivek S S,Rangan C P.Certificateless KEM and hybrid signcryption schemes revisited[C]∥Proceeding of ISPEC 2010.LNCS 6047,Berlin:Springer-Verlag,2010:294-307
[15] 孙银霞,李晖.高效无证书混合签密[J].软件学报,2011,22(7):1690-1698
[16] Liu Zhen-hua,Hu Yu-pu,Zhang Xiang-song,et al.Certificateless signcryption scheme in the standard model[J].Information Sciences,2010,0(3):452-464
[17] Weng Jian,Yao Guo-xiang,Deng R H,et al.Cryptanalysis of a certificateless signcryption scheme in the standard model[J].Information Sciences,2011,1(3):661-667
[18] Jin Zheng-ping,Wen Qiao-yan,Zhang Hua.A supplement to Liu et al.’s Certificateless signcryption scheme in the standard mo-del[EB/OL].http://eprint.iacr.org/2010/252,2010-05-03
[19] Luo Ming,Zou Chun-hua,Xu Jian-feng.Certificateless Broadcast Signcryption with Forward Secrecy[C]∥Conference on Computational Intelligence and Security.2011:910-914
[20] 刘文浩,许春香.无双线性配对的无证书签密方案[J].软件学报,2011,22(8):1918-1926
[21] Xie Wen-jian,Zhang Zhang.Certificateless Signcryption without Pairing[EB/OL].http://eprint.iacr.org/2010/187,2010-06-20
[22] Pointcheval D,Stern J.Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000,13(3):361-396
[23] Chen L,Cheng Z,Smart N P.Identity-based key agreement protocols from pairings[J].International Journal Information Security,2007,6(4):213-241

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!