[1]张席,陈泯融,杨玲.基于身份多接收者签密方案的安全性分析[J].深圳大学学报理工版,2010,27(4):408-412.
 ZHANG Xi,CHEN Min-rong,and YANG Ling.Cryptanalysis of an identity-based multi-recipient signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2010,27(4):408-412.
点击复制

基于身份多接收者签密方案的安全性分析()
分享到:

《深圳大学学报理工版》[ISSN:1000-2618/CN:44-1401/N]

卷:
第27卷
期数:
2010年4期
页码:
408-412
栏目:
光电与信息工程
出版日期:
2010-10-31

文章信息/Info

Title:
Cryptanalysis of an identity-based multi-recipient signcryption scheme
文章编号:
1000-2618(2010)04-0408-05
作者:
张席1陈泯融2杨玲1
1)深圳大学计算机与软件学院,深圳518060
2)深圳大学信息工程学院,深圳518060
Author(s):
ZHANG Xi1CHEN Min-rong2and YANG Ling1
1)College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, P.R. China
2)College of Information Engineering, Shenzhen University, Shenzhen 518060, P.R. China
关键词:
数据安全与计算机安全基于身份的多接收者签密双线性配对信息安全自适应选择密文身份攻击不可伪造性密码学
Keywords:
data security and computer security identity-based multi-recipient signcryptionbilinear pairinginformation securityadaptively chosen ciphertext and identity attack unforgeabilitycryptography
分类号:
TP 309.7;TN 918
文献标志码:
A
摘要:
基于身份多接受者签密是一种能够同时实现认证性与保密性的重要密码学工具.分析杜红珍等2009年提出的基于身份多接收者签密方案.通过模拟攻击验证了该方案不能满足信息保密性与不可伪造性的安全要求.在此基础上,提出一个改进的基于身份多用户签密的方案,新方案具有保密性与不可伪造性,其效率有待进一步提高.
Abstract:
Identity-based multi-recipient signcryption (ID-MRSC) is an important cryptographic primitive which can simultaneously provide authenticity and privacy. In 2009, DU and WEN proposed an ID-MRSC scheme, and claimed that their scheme satisfied the security requirements of confidentiality and unforgeability.This paper analyzed the scheme and presented a concrete attack against the scheme, indicating that the scheme fails to satisfy the security requirement of unforgeability. We presented a new ID-MRSC scheme that simultaneously satisfies the requirements of confidentiality and unforgeability.It’s efficiency could be improved is our future work.

参考文献/References:

[1]Zheng Y.数字签密或如何使签名加密代价远小于签名的代价与加密的代价之和[M]//计算机科学讲义:密码学进展-CRYPTO’97.柏林:施普林格出版社,1997:165-179.(英文版)
[2]Shamir A.基于身份的密码系统与签名方案[M]//计算机科学讲义:密码学进展-CRYPTO’84.柏林:施普林格出版社,1984:47-53.(英文版)
[3]Fiat A,Shamir A.如何认证自己:认证和签名问题的高效解决方案[M]//计算机科学讲义:密码学进展-CRYPTO’86.柏林:施普林格出版社,1987:186-194.(英文版)
[4]Cocks C.利用二次剩余的基于身份的加密方案[M]//计算机科学讲义:IMACC’01.柏林:施普林格出版社,2001:360-363.(英文版)
[5]Boneh D,Franklin M K.利用双线性配对的基于身份的加密[M]//计算机科学讲义:密码学进展-CRYPTO’01.柏林:施普林格出版社,2001:213-229.(英文版)
[6]Malone-Lee J,Mao W.一石二鸟:使用RSA的签密[M]//计算机科学讲义:CT-RSA’03.柏林:施普林格出版社,2003:211-225.(英文版)
[7]Barreto P,Libert B,McCullagh N,等.利用双线性配对的高效可证明安全的基于身份签名和签密方案[M]//计算机科学讲义:密码学进展-ASIACRYPT’05.柏林:普林格出版社,2005:515-532.(英文版)
[8]Boyen X.多用途的基于身份的签密:基于身份的密码学的瑞士军刀[M]//计算机科学讲义:密码学进展-CRYPTO’03.柏林:施普林格出版社,2003:383-399.(英文版)
[9]Chen L,Malone-Lee J.改进的基于身份的签密[M]//计算机科学讲义:PKC’05.柏林:施普林格出版社,2005:362-379.(英文版)
[10]无需随机预言模型的基于身份门限解密方案[J].深圳大学学报理工版,2010,27(3):340-346.(英文版)
[11]Yuen T H,Wei V K.基于双线性配对的快速可证明安全的基于身份盲签密方案[M]//计算机科学讲义:CT-RSA’05.柏林:施普林格出版社,2005:305-322(英文版).
[12]杜红珍,温巧燕.一个高效的基于身份多接收者签密方案[J].深圳大学学报理工版,2009,26(2):127-131.(英文版)
[13]Coron J S.完全域哈希函数的确切安全性[M]//计算机科学讲义:CRYPTO’00.柏林:施普林格出版社,2000:229-235.(英文版)




[1]Zheng Y. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(signature) + Cost(encryption)[M]//LNCS: CRYPTO’97. Berlin:Springer-Verlag Press,1997:105-179.
[2]Shamir A.Identity-based Cryptosystems and Signatureschemes[M]//LNCS:CRYPT’84. Berlin:Springer-Verlag Press,1984:47-53.
[3]Fiat A, Shamir A. How to Prove Yourself: Practical Solutions to Identification and Signature Problems[M]//LNCS:CRYPT’86. Berlin:Springer-Verlag Press,1986:186-194.
[4]Cocks C. An Identity Based Encryption Scheme Based on Quadratic Residues[M]//LNCS:IMACC’01. Berlin:Springer-Verlag Press,2001:360-363.
[5]Boneh D,Franklin M K. Identity-based Encryption from the Weil Pairing[M]//LNCS:CRYPT’01. Berlin:Springer-Verlag Press,2001:213-229.
[6]Malone-Lee J,Mao W. Two Birds One Stone: Signcryption Using RSA.[M]//LNCS:CT-RSA’03. Berlin:Springer-Verlag Press,2003:211-225.
[7]Barreto P,Libert B,McCullagh N,et al. Efficient and Provably-secure Identitybased Signatures and Signcryption from Bilinear Maps[M]//LNCS:ASIACRYPT’05. Berlin:Springer-Verlag Press,2005:515-532.
[8]Boyen X. Multipurpose Identity-based Signcryption (a Swiss Army Knife for Identitybased Cryptography)[M]//LNCS:CRYPT’03. Berlin:Springer-Verlag Press,2003:383-399.
[9]Chen L,Malone-Lee J. Improved Identity-based Signcryption[M]//LNCS:PKC’05. Berlin:Springer-Verlag Press,2005:362-379.
[10]Practicalidentity-basedthresholddecryption scheme without random oracle[J].Journal of Shenzhen University Science and Engineering,2010,27(3):340-346.
[11]Yuen T H,Wei V K. Fast and Proven Secure Blind Identity-based Signcryption from Pairings[M]//LNCS:CT-RSA’05. Berlin:Springer-Verlag Press,2005:305-322.
[12]DU Hong-zhen , WEN Qiao-yan. An efficient identity-based multi-recipient signcryption scheme[J]. Journal of Shenzhen University Science and Engineering, 2009,26(2):127-131.
[13]Coron J S. On the Exact Security of Full Domain Hash[M]//LNCS:CRYPT’00. Berlin:Springer-Verlag Press,2000:229-235.

相似文献/References:

[1]张席,陈泯融,刘浩.无需随机预言模型的基于身份门限解密方案[J].深圳大学学报理工版,2010,27(3):340.
 ZHANG Xi,CHEN Min-rong,and LIU Hao.Practical identity-based threshold decryption scheme without random oracle[J].Journal of Shenzhen University Science and Engineering,2010,27(4):340.
[2]张席,刘浩.安全签密方案在嵌入式设备中的应用[J].深圳大学学报理工版,2011,28(No.5(377-470)):417.
 ZHANG Xi and LIU Hao.The application in embedded device of a security signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2011,28(4):417.
[3]张鹏,喻建平,刘宏伟.同态签密方案及其在电子投票中的应用[J].深圳大学学报理工版,2011,28(No.6(471-564)):489.
 ZHANG Peng,YU Jian-ping,and LIU Hong-wei.A homomorphic signcryption scheme and its application in electronic voting[J].Journal of Shenzhen University Science and Engineering,2011,28(4):489.
[4]颜海龙,闫巧,冯纪强,等.基于PKI/CA互信互认体系的电子政务[J].深圳大学学报理工版,2012,29(No.2(095-188)):113.[doi:10.3724/SP.J.1249.2012.02113]
 YAN Hai-long,YAN Qiao,FENG Ji-qiang,et al.Research on standard system for mutual trust and mutual recognition based on PKI/CA in E-government[J].Journal of Shenzhen University Science and Engineering,2012,29(4):113.[doi:10.3724/SP.J.1249.2012.02113]
[5]欧阳春娟,李霞,李斌.基于递进多目标蛙跳优化的LSB±K隐写算法[J].深圳大学学报理工版,2012,29(No.3(189-282)):224.[doi:10.3724/SP.J.1249.2012.03224]
 OUYANG Chun-juan,LI Xia,and LI Bin.A secure LSB plus-minus K steganography based on escalating multi-objective SFLA[J].Journal of Shenzhen University Science and Engineering,2012,29(4):224.[doi:10.3724/SP.J.1249.2012.03224]
[6]李雄伟,张鹏,陈开颜,等.微控制器密码芯片秩相关电磁分析[J].深圳大学学报理工版,2012,29(No.3(189-282)):230.[doi:10.3724/SP.J.1249.2012.03230]
 LI Xiong-wei,ZHANG Peng,CHEN Kai-yan,et al.Rank correlation electromagnetic analysis on microcontroller[J].Journal of Shenzhen University Science and Engineering,2012,29(4):230.[doi:10.3724/SP.J.1249.2012.03230]

备注/Memo

备注/Memo:
收稿日期:2009-12-03;修回日期:2010-01-29
基金项目:国家自然科学基金资助项目(60903178)
作者简介:张席(1966-),男(土家族),湖南省永顺县人,深圳大学副教授.E-mail:zxsay@126.com
更新日期/Last Update: 2010-11-08