计算机应用 ›› 2014, Vol. 34 ›› Issue (9): 2659-2663.DOI: 10.11772/j.issn.1001-9081.2014.09.2659
收稿日期:
2014-03-13
修回日期:
2014-05-23
出版日期:
2014-09-01
发布日期:
2014-09-30
通讯作者:
赵晶晶
作者简介:
ZHAO Jingjing,ZHAO Xuexia,SHI Yuerong
Received:
2014-03-13
Revised:
2014-05-23
Online:
2014-09-01
Published:
2014-09-30
Contact:
ZHAO Jingjing
摘要:
作为密码学原语,签密同时具有签名的认证性与加密的机密性。在线/离线签密结合了在线/离线的方法,在已有基础上提高了系统的效率。但目前的在线/离线签密方案大多数都是在基于身份的环境下实现的,都存在密钥托管的安全问题。基于无证书密码体制撤销证书管理及无密钥托管问题的优点,提出了一种安全的在线/离线的无证书签密方案,满足离线阶段不需要确定接收者身份信息的条件,并在随机预言模型中证明了方案的安全性。
中图分类号:
赵晶晶 赵雪霞 石岳蓉. 结合在线/离线方法的无证书签密[J]. 计算机应用, 2014, 34(9): 2659-2663.
ZHAO Jingjing ZHAO Xuexia SHI Yuerong. Certificateless signcryption with online/offline technique[J]. Journal of Computer Applications, 2014, 34(9): 2659-2663.
[1]ZHENG Y. Digital signcryption or how to achieve cost (signature & encryption)(cost (signature)+(encryption)) [C]// CRYPTO'97: Proceedings of the 17th Annual International Cryptology Conference, LNCS 1294. Berlin: Springer-Verlag, 1997: 165-179.
[2]MALONE-LEE J. Identity-based signcryption [EB/OL]. [2014-03-06]. http://www.signcryption.org/publications/pdffiles/MaloneLee-eprint2002-098.pdf.
[3]BARRETO P S L M, LIBERT B, McCULLAGH N, et al.Efficient and provably-secure identity-based signatures and signcryption from bilinear maps [C]// ASIACRYPT 2005: Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 3788. Berlin: Springer-Verlag, 2005: 515-532.
[4]BOYEN X. Multipurpose identity-based signcryption [C]// CRYPTO 2003: Proceedings of the 23rd Annual International Cryptology Conference, LNCS 2729. Berlin: Springer-Verlag, 2003: 383-399.
[5]〖CM(27〗CHEN L, MALONE-LEE J. Improved identity-based signcryption [C]// PKC 2005: Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, LNCS 3386. Berlin: Springer-Verlag, 2005: 362-379.
[6]〖CM(27〗LIBERT B, QUISQUATER J-J. New identity based signcryption schemes from pairings [M]// IACR Cryptology ePrint Archive. [S.l.]: International Association for Cryptologic Research, 2003: 23.
[7]AN J H, DODIS Y, RABIN T. On the security of joint signature and encryption [C]// EUROCRYPT 2002: Proceedings of the 2002 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 2332. Berlin: Springer-Verlag, 2002: 83-107.
[8]ZHANG F, MU Y, SUSILO W. Reducing security overhead for mobile networks [C]// AINA 2005: Proceedings of the 2005 Advanced Information Networking and Applications. Washington, DC: IEEE Computer Society, 2005, 1: 398-403.
[9]AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography [C]// ASIACRYPT 2003: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin: Springer-Verlag, 2003: 452-473.
[10]BARBOSA M, FARSHIM P. Certificateless signcryption [C]// ASIACCS'08: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2008: 369-372.
[11]SELVI S S D, VIVEK S S, RANGAN C P. Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing [C]// ICISC 2010: Proceedings of the 5th International Conference on Information Security and Cryptology, LNCS 6151. Berlin: Springer-Verlag, 2010: 75-92.
[12]ARANHA D, CASTRO R, LOPEZ J, et al.Efficient certificateless signcryption [J]. Journal of 8o. Simpósio Brasileiro em Segurana da Informaao e de Sistemas Computacionais, 2008: 257-258.
[13]〖CM(26*2〗WU C-H, CHEN Z. A new efficient certificateless signcryption scheme [C]// ISISE'08: Proceedings of the 2008 International Symposium on Information Science and Engineering. Piscataway: IEEE, 2008: 661-664.
[14]LUO M, WEN Y, ZHAO H. Efficient certificaleless on-line/off-line signcryption scheme [J]. Computer Science, 2010, 37(5): 103-106.(罗铭,闻英友,赵宏.高效无证书的在线/离线签密方案[J].计算机科学,2010,37(5):103-106.)
[15]LIU J K, BAEK J, ZHOU J. Online/offline identity-based signcryption revisited [C]// ICISC 2011: Proceedings of the 14th International Conference on Information Security and Cryptology, LNCS 6584. Berlin: Springer-Verlag, 2011: 36-51.
[16]SHI W, KUMAR N, GONG P, et al.On the security of a certificateless online/offline signcryption for Internet of things [J/OL]. Journal of Peer-to-Peer Networking and Applications, [2014-01-14]. http://link.springer.com/article/10.1007%2Fs12083-014-0249-3.
[17]BONEH D, BOYEN X. Short signatures withoutrandom oracles [C]// EUROCRYPT 2004: Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3027. Berlin: Springer-Verlag, 2004: 56-73.
[18]BONEH D, BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles [C]// EUROCRYPT 2004: Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3027. Berlin: Springer-Verlag, 2004: 223-238. |
[1] | 孙晓玲 李姗姗 杨光 杨秋格. 基于差分表的Blow-CAST-Fish的密钥恢复攻击[J]. 计算机应用, 0, (): 0-0. |
[2] | 樊缤 李智 高健. 基于多尺度知识学习的深度鲁棒水印算法[J]. 计算机应用, 0, (): 0-0. |
[3] | 郭丽峰 王倩丽. 自适应安全的带关键字搜索的外包属性基加密[J]. 计算机应用, 0, (): 0-0. |
[4] | 沈子懿, 王卫亚, 蒋东华, 荣宪伟. 基于Hopfield混沌神经网络和压缩感知的可视化图像加密算法[J]. 计算机应用, 2021, 41(10): 2893-2899. |
[5] | 巫光福, 王影军. 基于区块链与云-边缘计算混合架构的车联网数据安全存储与共享方案[J]. 计算机应用, 2021, 41(10): 2885-2892. |
[6] | 高健 李智 樊缤 姜传贤. 基于光线投射采样和四元数正交矩的高效三维医学图像鲁棒零水印算法 [J]. 计算机应用, 0, (): 0-0. |
[7] | 徐丽云, 闫涛, 钱宇华. 基于级联混沌系统的分数域语音加密算法[J]. 计算机应用, 2021, 41(9): 2623-2630. |
[8] | 陈恒恒, 倪志伟, 朱旭辉, 金媛媛, 陈千. 基于聚类分析的差分隐私高维数据发布方法[J]. 计算机应用, 2021, 41(9): 2578-2585. |
[9] | 张永斌, 常文欣, 孙连山, 张航. 基于字典的域名生成算法生成域名的检测方法[J]. 计算机应用, 2021, 41(9): 2609-2614. |
[10] | 葛纪红, 沈韬. 基于区块链的能源数据访问控制方法[J]. 计算机应用, 2021, 41(9): 2615-2622. |
[11] | 张师鹏, 李永忠, 杜祥通. 基于半监督学习和三支决策的入侵检测模型[J]. 计算机应用, 2021, 41(9): 2602-2608. |
[12] | 李莉 杨鸿飞 董秀则. 基于身份多条件代理重加密的文件分级访问控制方案[J]. 计算机应用, 0, (): 0-0. |
[13] | 郭媛 王学文 王充 姜津霖. 基于动态网络的非线性置乱扩散同步图像加密[J]. 计算机应用, 0, (): 0-0. |
[14] | 陈葳葳, 曹利, 顾翔. 基于区块链的车联网电子取证模型[J]. 计算机应用, 2021, 41(7): 1989-1995. |
[15] | 卿欣艺, 陈玉玲, 周正强, 涂园超, 李涛. 基于中国剩余定理的区块链存储扩展模型[J]. 计算机应用, 2021, 41(7): 1977-1982. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||