Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200049-8.doi: 10.11896/jsjkx.241200049
• Information Security • Previous Articles Next Articles
XIE Zhenjie1,2, LUO Youqiang1,3, ZHAO Fangfang1, REN Shuai1
CLC Number:
| [1]ZHENG Y L.Digital signcryption or how to achieve cost(signa-ture & encryption)«cost(signature)+cost(encryption)[C]//Proceedings of Advances in Cryptology-CRYPTO’97.Springer Berlin Heidelberg,1997:165-179. [2]Identity-based cryptographic algorithms SM9-Part 1:General:GB/T 38635.1-2020[S].Beijing:National Information Security Standardization Technical Committee,2020-04-28. [3]Identity-based cryptographic algorithms SM9-Part 2:Algo-rithms:GB/T 38635.2-2020[S].Beijing:National Information Security Standardization Technical Committee,2020-04-28. [4]PENG C,HE D B,LUO M,et al.An identity-based ring signature scheme for SM9 algorithm[J].Journal of Cryptologic Research,2021,8(4):724-734. [5]RAO J T,CUI Z.Secure evoting protocol based on SM9 blind signature and ring signature[J].Computer Engineering,2023,49(6):13-23,33. [6]AN H Y,HE D B,BAO Z J,et al.Ring signature based on the SM9 digital signature and its application in blockchain privacy protection[J].Journal of Computer Research and Development,2023,60(11):2545-2554. [7]PU L,LIN C,WU W,et al.A public-key encryption with keyword search scheme from SM9[J].Journal of Cyber Security,2023,8(1):108-118. [8]LAI J C,HUANG X Y,HED B,et al.An efficient hierarchicalidentity-based encryption based on SM9[J].SCIENTIA SINICA Informations,2023,53(5):918-930. [9]LIU K,NING J T,WU W,et al.Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism[J].Journal on Communications,2023,44(12):158-170. [10]LI C,LIANG J K,DING Y J,et al.Hierarchical identity-based broadcast inner product functional encryption based on SM9[J].SCIENTIA SINICA Informations,2024,54(6):1400-1418. [11]CUI Y,HUANG X Y,LAIJ C,et al.Anonymous broadcast encryption based on SM9[J].Journal of Cyber Security,2023,8(6):15-27. [12]LIU X H,HUANG X Y,CHENG Z H,et al.Fault-tolerantidentity-based encryption from SM9[J].Science China(Information Sciences),2024,67(2):104-117. [13]MALONE-LEE J.Identity-based signcryption[J/OL].https://eprint.iacr.org/2002/098.pdf. [14]LIBERT B,QUISQUATER J.A new identity based signcryption scheme from pairings[C]//Proc of 2003 IEEE Information Theory Workshop(ITW 2003).IEEE,2003:155-158. [15]BARRETO P S L M,LIBERT B,MCCULLAGH N,et al.Efficient and provably-secure identity-based signatures and signcryption from bilinear maps[C]//Proc of Advances in Cryptology-ASIACRYPT 2005.Springer Berlin Heidelberg,2005:515-532. [16]YU Y,YANG B,SUN Y,et al.Identity based signcryptionscheme without random oracles[J].Computer Standard & Interfaces,2009,31(1):56-62. [17]JIN Z P,WEN Q Y,DU H Z.An improved semantically-secure identity-based signcryption scheme in the standard model[J].Computer & Electrical Engineering,2010,36(3):545-552. [18]SELVI S S D,VIVEK S S,VINAYAGAMURTHY D,et al.ID based signcryption scheme in standard model[C]//Proceedings Provable Security-ProvSec 2012.Springer Berlin Heidelberg,2012:35-52. [19]LI F G,TAKAGI T.Secure identity-based signcryption in thestandard model[J].Mathematical and Computer Modelling,2013,57(11/12):2685-2694. [20]LI X X,QIAN H F,WENG J,et al.Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model[J].Mathematical and Computer Modelling,2013,57(3/4):503-511. [21]KARATI A,ISLAM S H,BISWASG P,et al.Provably secure identity-based signcryption scheme for crowdsourced industrial internet of things environments[J].IEEE Internet of Things Journal,2018,5(4):2904-2914. [22]WANG X M,ZHANG Y,GUPTA B B,et al.An identity-based signcryption on lattice without trapdoor[J].Journal of Universal Computer Science,2019,25(3):282-293. [23]ELTAYIEB N,ELHABOB R,HASSAN A,et al.A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud[J].Journal of Systems Architecture,2020,102:101653. [24]MANDAL S,BERA B,SUTRALAA K,et al.Certificateless-signcryption-based three-factor user access control scheme for IoT environment[J].IEEE Internet of Things Journal,2020,7(4):3184-3197. [25]LAI J C,HUANG X Y,HE D B,et al.An efficient identity-based signcryption schemebased on SM9[J].Journal of Cryptologic Research,2021,8(2):314-329. [26]WANG Y T.Application research of digital signature algorithm based on SM9[D].Beijing:Beijing Jiaotong University,2021. [27]ZHANG C.Research on identity-based searchable encryptionschemes[D].Guiyang:Guizhou University,2022. [28]BAO J B.Identity-based ring signcryption scheme based on SM9 algorithm[D].Wuhan:Wuhan University,2022. [29]POINTCHEVAL D,STERN J.Security arguments for digitalsignatures and blind signatures[J].Journal of Cryptology,2000,13(3):361-369. [30]ZHOU J,ZHANG Y J,ZHU Y F.Generic ID-based signature schemes and forking lemma[J].Journal of Information Engineering University,2007,8(2):129-133. [31]CHENG Z H.Security analysis of SM9 key agreement and encryption[C]//Proc of the 14th International Conference Information Security and Cryptology.Fuzhou,2018:3-25. [32]LAI J C,HUANG X Y,HED B,et al.Security analysis of national secret SM9 digital signature and key encapsulation algorithm[J].SCIENTIA SINICA Informationis,2021,51(11):1900-1913. [33]Basddsa.hggm-Domestic cryptographic algorithm SM2/SM3/SM4/SM9/ZUC-Complete source code for Python implementation[EB/OL].(2024-07-11) [2024-07-11].https://gitee.com/basddsa/hggm. |
| [1] | TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J. Identity-based Linkable Ring Signcryption on NTRU Lattice [J]. Computer Science, 2025, 52(9): 396-404. |
| [2] | XIE Zhenjie, LIU Yiming, CAI Ruijie, LUO Youqiang. Performance Optimization Method for Domestic Cryptographic Algorithm SM9 [J]. Computer Science, 2025, 52(6): 390-396. |
| [3] | XIE Zhenjie, LIU Yiming, YIN Xiaokang, LIU Shengli, ZHANG Yongguang. Additively Homomorphic Encryption Scheme Based on Domestic Cryptographic Algorithm SM9 [J]. Computer Science, 2025, 52(11): 408-414. |
| [4] | LIU Zechao, LIANG Tao, SUN Ruochen, HAO Zhiqiang, LI Jun. Research and Implementation of MQTT Security Mechanism Based on Domestic CryptographicAlgorithms [J]. Computer Science, 2024, 51(2): 333-342. |
| [5] | WANG Shaohui, ZHAO Zhengyu, WANG Huaqun, XIAO Fu. Analysis and Improvement on Identity-based Remote Data Integrity Verification Scheme [J]. Computer Science, 2023, 50(7): 302-307. |
| [6] | ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337. |
| [7] | MO Tian-qing and HE Yong-mei. SIP Authentication Key Agreement of Protocol Based on Certificateless [J]. Computer Science, 2020, 47(6A): 413-419. |
| [8] | ZHAO Nan,ZHANG Guo-an. Authenticated Privacy Protection Scheme Based on Certificateless Ring Signcryption in VANET [J]. Computer Science, 2020, 47(3): 312-319. |
| [9] | ZUO Li-ming,CHEN Lan-lan. Special Digital Signature Scheme Based on Identity Identification and Its Application [J]. Computer Science, 2020, 47(1): 309-314. |
| [10] | XIE Yan-rong, MA Wen-ping, LUO Wei. New Cross-domain Authentication Model for Information Services Entity [J]. Computer Science, 2018, 45(9): 177-182. |
| [11] | GUO Li-juan, LV Xiao-lin. Optimistic Certified Email for Line Topology [J]. Computer Science, 2018, 45(8): 156-159. |
| [12] | CHAI Lin-peng , ZHANG Bin. One-off Public Key Scheme for Preventing Dishonest Third Party Attacking [J]. Computer Science, 2018, 45(7): 139-142. |
| [13] | HUO Shi-wei,ANG Wen-jing,LI Jing-zhi,SHEN Jin-shan. New Identity-based Authentication and Key Agreement Scheme in Ad hoc Networks [J]. Computer Science, 2018, 45(6A): 380-382. |
| [14] | CHEN Shao-hua, FAN Xiao-guang, CONG Wei, HUANG Jin-ke and SUN Xian-ming. Grid-based Identity Signcryption Algorithm and Application in Ad Hoc Network [J]. Computer Science, 2017, 44(6): 168-173. |
| [15] | WANG Gang, SUN Liang-xu, ZENG Zi-wei and YANG Dan. Secure and Efficient Hybrid Key Management Mechanism in Heterogeneous WSN [J]. Computer Science, 2016, 43(7): 153-156. |
|
||