一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

可證安全的IDPKC-to-CLPKC異構(gòu)簽密方案

張玉磊 張靈剛 王彩芬 馬彥麗 張永潔

張玉磊, 張靈剛, 王彩芬, 馬彥麗, 張永潔. 可證安全的IDPKC-to-CLPKC異構(gòu)簽密方案[J]. 電子與信息學(xué)報(bào), 2017, 39(9): 2127-2133. doi: 10.11999/JEIT170062
引用本文: 張玉磊, 張靈剛, 王彩芬, 馬彥麗, 張永潔. 可證安全的IDPKC-to-CLPKC異構(gòu)簽密方案[J]. 電子與信息學(xué)報(bào), 2017, 39(9): 2127-2133. doi: 10.11999/JEIT170062
ZHANG Yulei, ZHANG Linggang, WANG Caifen, MA Yanli, ZHANG Yongjie. Provable Secure IDPKC-to-CLPKC Heterogeneous Signcryption Scheme[J]. Journal of Electronics & Information Technology, 2017, 39(9): 2127-2133. doi: 10.11999/JEIT170062
Citation: ZHANG Yulei, ZHANG Linggang, WANG Caifen, MA Yanli, ZHANG Yongjie. Provable Secure IDPKC-to-CLPKC Heterogeneous Signcryption Scheme[J]. Journal of Electronics & Information Technology, 2017, 39(9): 2127-2133. doi: 10.11999/JEIT170062

可證安全的IDPKC-to-CLPKC異構(gòu)簽密方案

doi: 10.11999/JEIT170062
基金項(xiàng)目: 

國家自然科學(xué)基金(61163038,61262056), 甘肅省高等學(xué)??蒲许?xiàng)目(2015B-220,2013A-014)

Provable Secure IDPKC-to-CLPKC Heterogeneous Signcryption Scheme

Funds: 

The National Natural Science Foundation of China (61163038, 61262056), The Higher Educational Scientific Research Foundation of Gansu Province (2015B-220, 2013A-014)

  • 摘要: 為了保證異構(gòu)網(wǎng)絡(luò)中消息的機(jī)密性和認(rèn)證性,該文定義了身份公鑰密碼IDPKC到無證書公鑰密碼CLPKC異構(gòu)簽密模型,并提出具體的IDPKC-to-CLPKC異構(gòu)簽密方案。方案中雙方密碼系統(tǒng)參數(shù)相互獨(dú)立,能夠滿足實(shí)際應(yīng)用需求。在隨機(jī)預(yù)言模型下,基于GBDH, CDH和q-SDH困難假設(shè),證明方案滿足IDPKC-to-CLPKC異構(gòu)簽密的機(jī)密性和不可偽造性。同時(shí),該方案滿足匿名性,通過密文無法判斷發(fā)送方和接收方的身份,可以有效保護(hù)雙方的身份隱私。
  • ZHENG Y L. Digital signcryption or how to achieve cost (signature encryption) cost (signature) + cost (encryption)[C]. Proceedings of the Cryptology-CRYPTO 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234.
    SUN Y X and LI H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Science China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/ s11432-010-0061-5.
    AN J H, DODIS Y, and RABIN T. On the security of joint signature and encryption[C]. Proceedings of the Cryptology- EUROCRYP2002, Berlin, 2002: 83-107. doi: 10.1007/3-540- 46035-7_6.
    HUANG Q, WONG D S, and YANG G M. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095.
    FU X T, LI X W, and LIU W. IDPKC-to-TPKI construction of multi-receiver signcryption[C]. Proceedings of the INCoS(5), Washington, USA, 2013: 335-339. doi: 10.1109/ INCoS.2013.62.
    LI F G, ZHANG H, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012.2221897.
    LI F G, HAN Y Y, and JIN C H. Practical signcryption for secure communication of wireless sensor networks[J]. Wireless Personal Communications, 2016, 89(4): 1-22. doi: 10.1007/s11277-016-3327-4.
    張玉磊, 張靈剛, 張永潔, 等. 匿名CLPKC-TPKI異構(gòu)簽密方案[J]. 電子學(xué)報(bào), 2016, 44 (10): 2432-2439. doi: 10.3969/ j.issn.0372-2112.2016.10.022.
    ZHANG Y L, ZHANG L G, ZHANG Y J, et al. CLPKC- to-TPKI heterogeneous signcryption scheme with anonymity [J]. Acta Electronica Sinica, 2016, 44(10): 2432-2439. doi: 10.3969/j.issn.0372-2112.2016.10.022.
    周彥偉, 楊波, 張文政. 可證安全的高效無證書廣義簽密方案[J].計(jì)算機(jī)學(xué)報(bào), 2016, 39(3): 543-551. doi: 10.11897/SP.J. 1016.2016.00543.
    ZHOU Y W, YANG B, and ZHANG W Z. Provably secure and efficient certificateless generalized signcryption[J]. Chinese Journal of Computers, 2016, 39(3): 543-551. doi: 10.11897/ SP.J.1016.2016.00543.
    LI F G, HAN Y Y, and JIN C H. Practical access control for sensor networks in the context of the Internet of Things[J]. Computer Communications, 2016, 89-90: 154-164. doi: 10.1016/j.comcom.2016.03.007.
    張玉磊, 王歡, 李臣意, 等. 可證安全的緊致無證書聚合簽密方案[J].電子與信息學(xué)報(bào), 2015, 37(12): 2838-2844. doi: 10.11999 /JEIT150407.
    ZHANG Y L, WANG H, LI C Y, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
    BARBOSA M and FARSHIM P. Certificateless signcryption [C]. Proceedings of ASIACCS 2008, Tokyo, 2008: 369-372. doi: 10.1145/1368310.1368364.
    POINTCHEVAL D and STERN J. Security arguments for digital dignatures and blind signatures[J]. Journal of Cryptology, 2001, 13(3): 361-396. doi: 10.1007/s 001450010003.
    LI C K, YANG M, WONG D S, et al. An efficient signcryption scheme with key privacy and its extension to ring signcryption[J]. Journal of Computer Security, 2010, 18(3): 451-473. doi: 10.3233/JCS-2009-0374.
    路秀華, 溫巧燕, 王勵(lì)成. 格上的異構(gòu)簽密[J]. 電子科技大學(xué)學(xué)報(bào), 2016, 45(3): 458-462. doi: 10.3969/j.issn.1001-0548. 2016.02.025.
    LU X H, WEN Q Y, and WANG L C. A lattice-based
    heterogeneous signcryption[J]. Journal of University of Electronic Science and Technology of China, 2016, 45(3): 458-462. doi: 10.3969/j.issn.1001-0548.2016.02.025.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  1264
  • HTML全文瀏覽量:  179
  • PDF下載量:  272
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2017-01-18
  • 修回日期:  2017-04-13
  • 刊出日期:  2017-09-19

目錄

    /

    返回文章
    返回