異構(gòu)系統(tǒng)下的雙向簽密方案
doi: 10.11999/JEIT160056
基金項(xiàng)目:
陜西省自然科學(xué)基礎(chǔ)研究計(jì)劃 (2016JM6057),國(guó)家科技重大專項(xiàng)(2013ZX03005007),高等學(xué)校學(xué)科創(chuàng)新引智計(jì)劃(B08038)
Mutual Signcryption Schemes under Heterogeneous Systems
Funds:
The Natural Science Basic Research Plan in Shaanxi Province of China (2016JM6057), The National Science and Technology Major Project of the Ministry of Science and Technology of China (2013ZX03005007), The 111 Project (B08038)
-
摘要: 在過(guò)去的研究中,人們通常假設(shè)通信雙方都處在同一個(gè)公鑰密碼體制環(huán)境中,但隨著科技的發(fā)展和網(wǎng)絡(luò)的普及,不同的地區(qū)可能采用不同的公鑰密碼體制。為了解決異構(gòu)系統(tǒng)之間的通信安全問(wèn)題,該文提出兩種在公共密鑰基礎(chǔ)設(shè)施(PKI)和無(wú)證書(shū)公鑰密碼體制(CLC)下安全通信的異構(gòu)簽密方案。同時(shí)在雙線性Diffie-Hellman問(wèn)題(BDHP)和計(jì)算性Diffie-Hellman問(wèn)題(CDHP)的難解性下,所提方案在隨機(jī)預(yù)言模型中具有自適應(yīng)選擇密文攻擊下的不可區(qū)分性(IND-CCA2)和自適應(yīng)選擇消息攻擊下的不可偽造性(EUF-CMA)。
-
關(guān)鍵詞:
- 簽密 /
- 異構(gòu)系統(tǒng) /
- 選擇密文攻擊 /
- 不可偽造性
Abstract: In the past studies, it is generally assumed that both sides of communication are in the same environment of public key cryptography, but with the development of technology and the popularity of the network, different regions may have different public key cryptographies. In order to resolve the communication security problem between heterogeneous systems, two signcryption schemes are proposed, which are used to achieve the communication security between the Public Key Infrastructure (PKI) and CertificatLess public key Cryptography (CLC) under heterogeneous systems. It is proved that the schemes have INDistinguishability against Adaptive Chosen Ciphertext Attacks (IND-CCA2) under Bilinear Diffie-Hellman Problem (BDHP) and Existential UnForgeability against adaptive Chosen Messages Attacks (EUF-CMA) under the Computational Diffie-Hellman Problem (CDHP) in the random oracle model.-
Key words:
- Signcryption /
- Heterogeneous system /
- Chosen ciphertext attack /
- Unforgeability
-
SHAMIR A. Identity-based cryptosystem and signature scheme [C]. Proceedings of CRYPTO 84 on Advances in cryptology, New York, NY, USA, 1984, 196: 47-53. doi: 10.1007/3-540-39568-7_5 . AL-RIYAMI S S and PATERSON K G. Certificateless public key cryptography[C]. International Conference on the Theory and Application of Cryptology and Information Security, Taipei, China, 2003: 452-473. doi: 10.1007/978-3-540-40061- 5_29. ZHENG Yuliang. Digital signcryption or how to achieve cost (signature encryption)cost (signature) +cost (encryption)[C]. Proceedings of the Cryptology- Crypto 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234 BAEK J, STEINFELD R, and ZHENG Yuliang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology PKC2002, Paris, France, 2002: 81-98. doi: 10.1007/3-540-45664-3_6. CH A S, UDDIN N, SHER M, et al. An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography?[J]. Multimedia Tools and Applications, 2015, 74(5): 1711-1723. doi: 10.1007/s11042- 014-2283-9. LI C K, YANG G, WONG D S, et al. An efficient signcryption scheme with key privacy[C]. Proceedings of the 4th European Public Key Infrastructure Workshop (EuroPKI 2007), Palma de Mallorca, Spain, 2007, 4582: 78-93. doi: 10. 1007/978-3-540-73408-6_6. QIN Bo, WANG Huaqun, WU Qianhong, et al. An simultaneous authentication and secrecy in identity-based data upload to cloud[J]. Cluster Computing, 2013, 16(4): 845-859. doi: 10.1007/s10586-013-0258-7. PANG Liaojun, GAO Lu, LI Huixian, et al. Anonymous multi-receiver ID-based signcryption scheme[J]. Information Security, 2015, 9(3): 193-201. doi: 10.1049/iet-ifs.2014.0360. BARBOSA M and FARSHIM P. Certificateless signcryption [C]. Proceedings of the ASIACCS2008, New York, USA, 2008: 369-372. doi: 10.1145/1368310.1368364. 張玉磊, 王歡, 李臣意, 等. 可證安全的緊致無(wú)證書(shū)聚合簽密方案[J]. 電子與信息學(xué)報(bào), 2015, 37(12): 2839-2844. doi: 10.11999/JEIT150407. ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2839-2844. doi: 10.11999/JEIT150407. 孫銀霞, 李暉, 李小青. 無(wú)證書(shū)體制下的多接收者簽密密鑰封裝機(jī)制[J]. 電子與信息學(xué)報(bào), 2010, 32(9): 2249-2252. doi: 10.3724/SP. J.1146.2009.01260. SUN Yinxia, LI Hui, and LI Xiaoqing. Certificateless signcryption KEM to multiple recipients[J]. Journal of Electronics Information Technology, 2010, 32(9): 2249-2252. doi: 10.3724/SP.J.1146.2009.01260. 葛愛(ài)軍, 陳少真. 具有強(qiáng)安全性的不含雙線性對(duì)的無(wú)證書(shū)簽名方案[J]. 電子與信息學(xué)報(bào), 2010, 32(7): 1766-1768. doi: 10.3724/SP.J.1146.2009.00965. GE Aijun and CHEN Shaozhen. Strongly secure certificateless signature scheme without pairings[J]. Journal of Electronics Information Technology, 2010, 32(7): 1766-1768. doi: 10.3724/SP.J.1146.2009.00965. ESLAMI Z and PAKNIAT N. Certificateless aggregate signcryption: security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. doi: 10.1016/j.jksuci.2014.03.006. YIN A and LIANG H. Certificateless hybrid signcryption scheme for secure sommunication of wireless sensor networks [J]. Wireless Personal Communications, 2015, 80(3): 1049-1062. doi: 10.1007/s11277-014-2070-y.10. HAFIZUL ISLAM S K and LI Fagen. Leakage-free and provably secure certificateless signcryption scheme using bilinear pairings[J]. The Computer Journal, 2015, 58(10): 2636-2648. doi: 10.1093/comjnl/bxv002. SUN Yinxia and LI Hui. Eifficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Secience China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5. HUANG Q, WONG D S, and YANG G. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095. LI Fagen, ZHANG Hui, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 1109/JSYST.2012. 2221897. 俞惠芳, 楊波. 可證安全的無(wú)證書(shū)混合簽密[J]. 計(jì)算機(jī)學(xué)報(bào), 2015, 38(4): 805-813. doi: 10.3724/SP.J.1016.2015.00804. YU Huifang and YANG Bo. Provably secure certificateless hybrid signcryption[J]. Chinese Journal of Computers, 2015, 38(4): 805-813. doi: 10.3724/SP.J.1016.2015.00804. -
計(jì)量
- 文章訪問(wèn)數(shù): 1523
- HTML全文瀏覽量: 203
- PDF下載量: 422
- 被引次數(shù): 0