[1]杜红珍,温巧燕.基于身份多接收者签密双线性对方案[J].深圳大学学报理工版,2009,26(2):127-131.
 DU Hong-zhen and WEN Qiao-yan.An efficient identity-based multi-recipient signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2009,26(2):127-131.
点击复制

基于身份多接收者签密双线性对方案()
分享到:

《深圳大学学报理工版》[ISSN:1000-2618/CN:44-1401/N]

卷:
第26卷
期数:
2009年2期
页码:
127-131
栏目:
电子与信息工程
出版日期:
2009-04-30

文章信息/Info

Title:
An efficient identity-based multi-recipient signcryption scheme
文章编号:
1000-2618(2009)02-0127-05
作者:
杜红珍12 温巧燕1
1)北京邮电大学网络与交换技术国家重点实验室,北京 100876;
2)宝鸡文理学院数学系,陕西宝鸡 721007
Author(s):
DU Hong-zhen12 and WEN Qiao-yan1
1)State Key Laboratory of Networking and Switching Technology,BeijingUniversityofPostsandTelecommunications,Beijing 100876,P.R.China;
2)Mathematics Departments,Baoji University of Arts and Sciences,Baoji 721007,Shaanxi,P.R.China
关键词:
基于身份的密码学签密机密性不可伪造性双线性对随机预言机模型
Keywords:
ID-based cryptographysigncryptionconfidentialityunforgeabilitybilinear pairingsrandom oracle model
分类号:
TP 309.6;TN 918
文献标志码:
A
摘要:
基于身份的多接收者签密是基于身份的签密扩展,它以保密且认证的方式传送某一消息给多个接收者.给出基于身份的多接收者签密的定义与安全模型,利用双线性对构造一个新的基于身份的多接收者签密方案.在随机预言机模型下,利用该方案可抗适应性选择密文与身份攻击,且方案满足不可伪造性、前向安全性和公开可验证性.签密涉及多个接收者时,计算成本低,且效率高.
Abstract:
Identity-based multi-recipient signcryption (ID-MRSC) is an extension of identity-based signcryption.It enables a user to broadcast a message to multiple receivers in a confidential and authenticated way.The definition and the security model of ID-MRSC was presented. The ID-MRSC scheme was secure against adaptively chosen ciphertext and identity attack in the random oracle model.The ID-MRSC scheme meets the requirements of signature unforgeability,forward security and public verifiability.Furthermore,it is significantly more efficient than currently available identity-based signcryption schemes,which have to re-signcrypt and re-send a message multiple times when involving multiple recipients with respect to computational costs and communication overheads.

参考文献/References:

[1]Shamir A.基于身份的密码系统与签名方案[M]// 计算机科学讲义:密码学进展-CRYPTO 1984.柏林:施普林格出版社,1985:47-53 (英文版).
[2]ZHENG Yu-liang.数字签密或如何使签名加密代价远小于签名的代价与加密的代价之和[M]//计算机科学讲义:密码学进展-Crypto97.柏林:施普林格出版社,1997:165-179(英文版).
[3]Yum B H,Lee P J.基于KCDSA的新的签密方案[M]//计算机科学讲义:ICISC01.柏林:施普林格出版社,2001: 305-317(英文版).
[4]杜红珍,温巧燕.高效的短签密方案[J].北京邮电大学学报,2008,31(1):84-87.
[5]Libert B,Quisquater J J.基于Gap Diffie-Hellman 群的高效签密方案[M]//PKC 2004.柏林:施普林格出版社,2004:187-200(英文版).
[6]Libert B,Quisquater J J.利用q-Diffie-Hellman 问题改进的签密方案[M]// 计算机科学讲义:SCN04.柏林:施普林格出版社,2005:220-234(英文版).
[7]MA Chang-she.可公开验证的高效短签密方案[M]//计算机科学讲义:Inscrypt 2006.柏林:施普林格出版社,2006:118-129(英文版).
[8]Malone-Lee J.基于身份的签密[DB/OL].[2007-12-01].指纹密码,http://eprint.iacr.org/2002/098.pdf.2002(英文版).
[9]Boyen X.多用途的基于身份的签密:基于身份的密码学的瑞士军刀[M]// 计算机科学讲义:密码学进展-Crypto2003.柏林:施普林格出版社,2003:383-399(英文版).
[10]Chow S S M,Yiu S M,Lucas C K,等.高效的具有前向安全,可公开验证和公开密文的真实性的可证安全的基于身份的签密[M]// 计算机科学讲义:信息安全与密码学-ICISC03. 柏林:施普林格出版社,2004:352-369(英文版).
[11]Chen L,Malone-Lee J.改进的基于身份的签密[M]// 计算机科学讲义:PKC05.柏林:施普林格出版社,2005:362-379(英文版).
[12]Chen H Y,Lu S W,Liu Z H,等.具有短密文的利用双线性对构造的基于身份的签密[M]// 计算机科学讲义. 柏林:施普林格出版社,2006:342-351(英文版).
[13]李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].中国计算机学报,2006,29(9):1641-1647.


[1]Shamir A.Identity-Based Cryptosystems and Signature Schemes[M]// LNCS:Advances in Cryptology-CRYPTO84.Berlin:Springer-Verlag Press,1985:47-53.
[2]ZHENG Yu-liang.Digital Signcryption or How to Achieve Cost(Signature & Encryption)  Cost(Signature)+Cost(Encryption)[M]//LNCS:Advances in Cryptology-Crypto97.Berlin:Springer-Verlag Press,1997:165-179.
[3]Yum B H,Lee P J.New Signcryption Schemes Based on KCDSA[M]//LNCS:Proc of ICISC01.Berlin:Springer-Verlag Press,2001:305-317.
[4]DU Hong-zhen,WEN Qiao-yan.Efficient short signcryption scheme[J].Beijing University of Posts and Telecommunications,2008,31(1):84-87 (in Chinese).
[5]Libert B,Quisquater J J.Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups[M]//PKC 2004. Berlin:Springer-Verlag Press,2004:187-200.
[6]Libert B,Quisquater J J.Improved Signcryption from q-Diffie-Hellman Problems[M]//LNCS:Security Communication Networks-SCN04.Berlin:Springer-Verlag Press, 2005:220-234.
[7]MA Chang-she.Efficient Short Signcryption Scheme with Public Verifiability[M]//LNCS:Inscrypt 2006.Berlin:Springer-Verlag Press,2006:118-129.
[8]Malone-Lee J.Identity based signcryption[DB/OL].[2007-12-01]Cryptology ePrintArchive. http://eprint.iacr.org/2002/098.pdf.2002.
[9]Boyen X.Multipurpose Identity-Based Signcryption:a Swiss Army Knife for Identity-based Cryptography[M]//LNCS:Advances in Cryptology-Crypto2003.Berlin:Springer-Verlag Press,2003:383-399.
[10]Chow S S M,Yiu S M,Lucas C K,et al.Efficient Forward and Provably Secure ID-based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity[M]//LNCS:Information Security and Cryptology-ICISC03,Berlin:Springer-Verlag Press,2004:352-369.
[11]Chen L,Malone-Lee J.Improved Identity-based Signcryption[M]// LNCS:PKC05.Berlin:Springer-Verlag Press, 2005:362-379.
[12]CHEN H Y,Lu S W,Liu Z H,et al.An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings[M]//Ledure Notes in Computer Science. Berlin:Springer Press,2006:342-351.
[13]LI Fa-gen,HU Yu-pu,LI Gang.An efficient identity-based signcryption scheme[J].Chinese Journal of Computers,2006,29(9):1641-1647 (in Chinese).

相似文献/References:

[1]张席,陈泯融,刘浩.无需随机预言模型的基于身份门限解密方案[J].深圳大学学报理工版,2010,27(3):340.
 ZHANG Xi,CHEN Min-rong,and LIU Hao.Practical identity-based threshold decryption scheme without random oracle[J].Journal of Shenzhen University Science and Engineering,2010,27(2):340.
[2]张席,刘浩.安全签密方案在嵌入式设备中的应用[J].深圳大学学报理工版,2011,28(No.5(377-470)):417.
 ZHANG Xi and LIU Hao.The application in embedded device of a security signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2011,28(2):417.

备注/Memo

备注/Memo:
收稿日期:2007-12-16;修回日期:2008-06-27
基金项目:国家自然科学基金资助项目(60873191)
作者简介:杜红珍(1978-),女(汉族),陕西省宝鸡市人,北京邮电大学博士研究生、宝鸡文理学院讲师.E-mail:duhongzhen@gmail.com
通讯作者:温巧燕(1959-),女(汉族),北京邮电大学教授、博士生导师.E-mail:wqy@bupt.edu.cn
更新日期/Last Update: 2009-05-15