[1]张席,刘浩.安全签密方案在嵌入式设备中的应用[J].深圳大学学报理工版,2011,28(No.5(377-470)):417-422.
 ZHANG Xi and LIU Hao.The application in embedded device of a security signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2011,28(No.5(377-470)):417-422.
点击复制

安全签密方案在嵌入式设备中的应用()
分享到:

《深圳大学学报理工版》[ISSN:1000-2618/CN:44-1401/N]

卷:
第28卷
期数:
2011年No.5(377-470)
页码:
417-422
栏目:
电子与信息科学
出版日期:
2011-09-20

文章信息/Info

Title:
The application in embedded device of a security signcryption scheme
文章编号:
1000-2618(2011)05-0417-06
作者:
张席刘浩
深圳大学计算机与软件学院,深圳 518060
Author(s):
ZHANG Xi and LIU Hao
College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, P.R.China
关键词:
数据安全与计算机安全椭圆曲线密钥体系嵌入式系统基于身份的密码学前向安全
Keywords:
data security and computer securityelliptic curve cryptosystemembedded systemidentity-based cryptographyforward-security
分类号:
TP 309.7;TN 918
文献标志码:
A
摘要:
基于椭圆曲线离散对数问题的难解性,利用二元域上的Koblitz曲线,结合对称加密算法,提出一种适于嵌入式系统的高效签密算法.构建该算法安全模型,对其完整性、可信性、不可伪造性及匿名性进行归约证明.不同设备仿真验证表明,该算法在嵌入式设备中安全可行.
Abstract:
A high efficiency signcryption scheme with Koblits curve of binary field and symmetric encryption for the implementation in embedded system was proposed to overcome the hardness of discrete logarithm of ellliptic curve.The security model was also presented.The completeness, confidentiality, unforgeability and ciphertext anonymity of this proposed scheme were discussed in details. The simulation results under various benchmark devices have demonstrated that the efficiency of this new scheme is desirable for embedded system.

参考文献/References:

[1] Koblitz N.椭圆曲线密码系统[J].计算机科学,1987,48(177):203-209.(英文版)
[2] Miller V.椭圆曲线在密码系统中的应用[C]// 密码学会议录-Crypto’85.柏林:施普林格出版社,1986:417-426.(英文版)
[3] Wajih E H Y,Mohsen M,Rached T.一种安全的嵌入式设备椭圆曲线签名方案[C]// 信号、电路与系统国际会议论文集.莫纳斯提(突尼斯):IEEE出版社,2008(7/8/9):1-6.(英文版)
[4] 张席,杭欢花. 一种基于强DH加密的高效转换方案[J].武汉大学学报自然科学版,2010,15(5):415-421.(英文版)
[5] Shamir A.基于身份的加密系统与签名方案[C]// 密码学会议录- Crypto’84.柏林:施普林格出版社,1984:47-53.(英文版)
[6] 张席,陈泯融,刘浩,等.无需随机预言模型的基于身份门限解密方案[J].深圳大学学报理工版,2010,37(3):340-346.(英文版)
[7] 张席,陈泯融,杨玲,等.基于身份多接受者签名方案的安全性分析[J].深圳大学学报理工版,2010,37(4):408-412.(英文版)
[8] Anderson R.公开密钥体系的两个说明[C]// 第4届计算机与通信安全会议论文集.苏伊士(埃及):美国计算机协会,1997:3-6.(英文版)
[9] Bellare M,Miner S K.一种前向安全的数字签名方案[C]// 密码学会议录- Crypto’99.柏林:施普林格出版社,1999:431-448.(英文版)
[10] 张席,杭欢花. 一种改进的前向安全盲签名方案[J].武汉大学学报理学版, 2011,57(5):434-438.
[11] WANG Shu-hong,BAO Fang,DENG R H. 具有可证安全性前向安全盲签名方案加密分析[C]// 第7届信息与通信安全国际会议论文集. 柏林:施普林格出版社, 2005:53-60.(英文版)
[12] ZHENG Yu-liang.数字签密如何达到预定的效率:使签密的代价签名+加密的代价[C]// 密码学会议录- Crypto’97.柏林:施普林格出版社,1997:165-179.(英文版)
[13] LI Fa-gen,Shirase M,Takagi T.基于身份混合加密[C]// ARES(有效性,可靠性,安全性)国际会议论文集.[s.l.]:[s.n.],2009:534-539.(英文版)
[14] LI Chung-ki,YANG Guo-min,WONG D S.等.一种具有密钥私有性的签密方案和它在环签密中的扩展[J].计算机安全期刊,2010,18(3):451-473.(英文版)
[15] YANG Guo-min,WONG D S,DENG Xiao-tie.一种密钥私有签密方案的分析与改进[J].信息安全,2005,3650:218-232.(英文版)
[16] Libert B, Quisquater J-J.差分Diffe-Hellman 群中具有密钥私有的签密方案[C]// PKC’04 公钥密码学进展会议论文集.柏林:施普林格出版社,2004,2947:187-200.(英文版)



[1] Koblitz N.Elliptic curve cryptosystems [J].Mathematics of Computation,1987,48(177):203-209.
[2] Miller V S.Uses of elliptic curves in cryptography[C]// Proceedings of CRYPTO’85 on Advances in Cryptology. Berlin:Springer-Verlag,1986:417-426.
[3] Wajih E H Y,Mohsen M,Rached T.A secure elliptic curve digital signature scheme for embedded devices[C]// International Conference on Signals,Circuits and Systems. Monastir(Tunisia):IEEE Press,2008(7/8/9):1-6
[4] ZHANG Xi,HANG Huan-hua.An efficient conversion scheme for enhancing security of diffie-Hellman-based encryption[J].Wuhan University Journal of Natural Sciences,2010,15(5):415-421.
[5] Shamir A.Identity-based cryptosistems and signature schemes[C]// Proceedings of CRYPTO’84 on Advances in Cryptology.Berlin:Springer-Verlag,1984:47-53
[6] ZHANG Xi,CHEN Min-rong,LIU Hao.Practical identity-based threshold decryption scheme without random oracle[J].Journal of Shenzhen University Science and Engineering,2010,27(3):340-346.
[7] ZHANG Xi,CHEN Min-rong,YANG Ling.Cryptanalysis of an identity-based multi-recipient signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2010,27(4):408-412.
[8] Anderson R.Two remarks on public key on cryptology[C]//Proceedingsofthe 4thACMconferenceonComputer and communications.Zurich(Egypt):Association for Computing Machinery,1997:3-6
[9] Bellare M,Miner S K.A forward-secure digital signature scheme[C]// Proceedings of CRYPTO’99 on Advance in Cryptology.Berlin:Springer-Verlag,1999:431-448.
[10] ZHANG Xi,HANG Huan-hua. A new forward-secure blind signature scheme[J].Journal of Wuhan University:Natural Science Edition,2011,57(5):434-438.(in Chinese)
[11] WANG Shu-hong,BAO Fang,DENG R H. Cryptanalysis of a forward secure blind signature scheme with provable security[C]// 7th International Conference on Information and Communications Security. Berlin:Spring-Verlag,2005:53-60.
[12] ZHENG Yu-liang. Digital signcryption or how to achieve cost(signature & encryption) cost(signature) + cost(encryption)[C]// Proceedings of CRYPTO’99 on Advances in Cryptology.Berlin:Springer-Verlag,1997:165-179.
[13] LI Fa-gen,Shirase M,Takagi T.Identity-based Hybrid signcryption[C]// International Conference on Reliability and Security.[s.l.]:[s.n.],2009:534-539.
[14] LI Chung-ki,YANG Guo-min,WONG D S,et al.An efficient signcryption scheme with key privacy and its extension to ring signcryption[J].Journal of Computer Security,2010,18(3):451-473.
[15] YANG Guo-min,WONG D S,DENG Xiao-tie.Analysis and improvement of a signcryption scheme with key privacy[J].Information Security,2005,3650:218-232.
[16] Libert B,Quisquater J-J.Effcient signcryption with key privacy from gap Diffe-Hellman groups[C]// In Public Key Cryptography.Berlin:Springer-Verlag,2004,2947:187-200.

相似文献/References:

[1]张席,陈泯融,刘浩.无需随机预言模型的基于身份门限解密方案[J].深圳大学学报理工版,2010,27(3):340.
 ZHANG Xi,CHEN Min-rong,and LIU Hao.Practical identity-based threshold decryption scheme without random oracle[J].Journal of Shenzhen University Science and Engineering,2010,27(No.5(377-470)):340.
[2]张席,陈泯融,杨玲.基于身份多接收者签密方案的安全性分析[J].深圳大学学报理工版,2010,27(4):408.
 ZHANG Xi,CHEN Min-rong,and YANG Ling.Cryptanalysis of an identity-based multi-recipient signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2010,27(No.5(377-470)):408.
[3]张鹏,喻建平,刘宏伟.同态签密方案及其在电子投票中的应用[J].深圳大学学报理工版,2011,28(No.6(471-564)):489.
 ZHANG Peng,YU Jian-ping,and LIU Hong-wei.A homomorphic signcryption scheme and its application in electronic voting[J].Journal of Shenzhen University Science and Engineering,2011,28(No.5(377-470)):489.
[4]颜海龙,闫巧,冯纪强,等.基于PKI/CA互信互认体系的电子政务[J].深圳大学学报理工版,2012,29(No.2(095-188)):113.[doi:10.3724/SP.J.1249.2012.02113]
 YAN Hai-long,YAN Qiao,FENG Ji-qiang,et al.Research on standard system for mutual trust and mutual recognition based on PKI/CA in E-government[J].Journal of Shenzhen University Science and Engineering,2012,29(No.5(377-470)):113.[doi:10.3724/SP.J.1249.2012.02113]
[5]欧阳春娟,李霞,李斌.基于递进多目标蛙跳优化的LSB±K隐写算法[J].深圳大学学报理工版,2012,29(No.3(189-282)):224.[doi:10.3724/SP.J.1249.2012.03224]
 OUYANG Chun-juan,LI Xia,and LI Bin.A secure LSB plus-minus K steganography based on escalating multi-objective SFLA[J].Journal of Shenzhen University Science and Engineering,2012,29(No.5(377-470)):224.[doi:10.3724/SP.J.1249.2012.03224]
[6]李雄伟,张鹏,陈开颜,等.微控制器密码芯片秩相关电磁分析[J].深圳大学学报理工版,2012,29(No.3(189-282)):230.[doi:10.3724/SP.J.1249.2012.03230]
 LI Xiong-wei,ZHANG Peng,CHEN Kai-yan,et al.Rank correlation electromagnetic analysis on microcontroller[J].Journal of Shenzhen University Science and Engineering,2012,29(No.5(377-470)):230.[doi:10.3724/SP.J.1249.2012.03230]

备注/Memo

备注/Memo:
收稿日期:2010-04-12;修回日期:2011-06-03
基金项目:国家自然科学基金资助项目(60903178)
作者简介:张席(1966-),男(土家族),湖南省永顺县人,深圳大学副教授.E-mail:zxsay@126.com
更新日期/Last Update: 2011-09-22