计算机应用 ›› 2014, Vol. 34 ›› Issue (10): 2834-2839.

• 计算机安全 • 上一篇    下一篇

标准模型下安全基于身份代理签密方案

明洋,冯杰,胡齐俊   

  1. 长安大学 信息工程学院, 西安 710064
  • 收稿日期:2014-04-14 修回日期:2014-06-12 出版日期:2014-10-01 发布日期:2014-10-30
  • 通讯作者: 冯杰
  • 作者简介:明洋(1979-),男,陕西榆林人,副教授,博士,主要研究方向:公钥密码学、可证明安全理论、无线网络安全;
    冯杰(1987-),女,陕西咸阳人,硕士研究生,主要研究方向:密码学、数字签名;
    胡齐俊(1990-),男,湖北黄冈人,硕士研究生,主要研究方向:网络信息安全。
  • 基金资助:

    教育部人文社会科学研究项目;中国博士后科学基金资助项目;西安市科技计划项目;中央高校基础研究支持计划资助项目

Secure identity-based proxy signcryption scheme in standard model

MING Yang,FENG Jie,HU Qijun   

  1. School of Information Engineering, Changan University, Xian Shaanxi 710064, China
  • Received:2014-04-14 Revised:2014-06-12 Online:2014-10-01 Published:2014-10-30
  • Contact: FENG Jie

摘要:

针对现实中代理签密的安全问题,提出一种基于Gu等(GU K, JIA W J, JIANG C L. Efficient identity-based proxy signature in the standard model. The Computer Journal, 2013:bxt132)代理签名的标准模型下可证安全的基于身份代理签密方案。代理签密允许原始签密者授权签密能力给代理签密者,后者能够代表前者生成密文。该方案通过结合基于身份签密和代理签名,既保持了基于身份签密的优点,又具有代理签名的功能。分析表明,基于Diffie-Hellman问题假设下,所提方案满足机密性性和不可伪造性。与已知方案相比,代理密钥生成算法和代理签密算法中各需要2个对运算和1个对运算,方案效率更高。

Abstract:

Concerning the proxy signcryption security problem in reality, motivated by Gus proxy signature scheme (GU K, JIA W J, JIANG C L. Efficient identity-based proxy signature in the standard model. The Computer Journal, 2013:bxt132), a new secure identity-based proxy signcyption scheme in the standard model was proposed. Proxy signcryption allowed that the original signcrypter delegated his authority of signcrption to the proxy signcrypter in such a way that the latter could generate ciphertext on behalf of the former. By combining the functionalities of identity-based signcryption and proxy signature scheme, the new scheme not only had the advantage of identity-based signcryption scheme, but also had the function of proxy signature scheme. Analysis results show that, under the assumption of Diffie-Hellman problem, the proposed scheme is confidential and unforgeable. Compared with the known scheme, the scheme requires 2 pairings computation in proxy key generation and 1 pairing computation in proxy signcryption. So it has higher computational efficiency.

中图分类号: