可證安全的IDPKC-to-CLPKC異構(gòu)簽密方案
doi: 10.11999/JEIT170062
-
1.
(西北師范大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院 蘭州 730070) ②(甘肅衛(wèi)生職業(yè)學(xué)院 蘭州 730000)
國家自然科學(xué)基金(61163038,61262056), 甘肅省高等學(xué)??蒲许?xiàng)目(2015B-220,2013A-014)
Provable Secure IDPKC-to-CLPKC Heterogeneous Signcryption Scheme
-
1.
(College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China)
-
2.
(Gansu Health Vocational College, Lanzhou 730000, China)
The National Natural Science Foundation of China (61163038, 61262056), The Higher Educational Scientific Research Foundation of Gansu Province (2015B-220, 2013A-014)
-
摘要: 為了保證異構(gòu)網(wǎng)絡(luò)中消息的機(jī)密性和認(rèn)證性,該文定義了身份公鑰密碼IDPKC到無證書公鑰密碼CLPKC異構(gòu)簽密模型,并提出具體的IDPKC-to-CLPKC異構(gòu)簽密方案。方案中雙方密碼系統(tǒng)參數(shù)相互獨(dú)立,能夠滿足實(shí)際應(yīng)用需求。在隨機(jī)預(yù)言模型下,基于GBDH, CDH和q-SDH困難假設(shè),證明方案滿足IDPKC-to-CLPKC異構(gòu)簽密的機(jī)密性和不可偽造性。同時(shí),該方案滿足匿名性,通過密文無法判斷發(fā)送方和接收方的身份,可以有效保護(hù)雙方的身份隱私。Abstract: In order to ensure the confidentiality and authentication in different network environments, the security model of IDPKC-to-CLPKC heterogeneous signcryption is defined from IDentity-based Public Key Cryptography (IDPKC) to CertificateLess Public Key Cryptography (CLPKC), and a concrete IDPKC-to-CLPKC heterogeneous signcryption scheme is presented. The system parameters in IDPKC and CLPKC are independent on each other in the scheme, which can meet the practical requirements. Based on the assumptions of Gap Bilinear Diffie-Hellman (GBDH), Computational Diffie-Hellman (CDH) and q-Strong Diffie-Hellman (q-SDH), the scheme is proved to satisfy the confidentiality and unforgeability in the random oracle model. Moreover, the scheme is also proved to satisfy the properties of ciphertext anonymity, which means the attacker can not judge the identities of the sender and the receiver. Therefore, the scheme can effectively protect the privacy of both identities.
-
ZHENG Y L. Digital signcryption or how to achieve cost (signature encryption) cost (signature) + cost (encryption)[C]. Proceedings of the Cryptology-CRYPTO 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234. SUN Y X and LI H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Science China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/ s11432-010-0061-5. AN J H, DODIS Y, and RABIN T. On the security of joint signature and encryption[C]. Proceedings of the Cryptology- EUROCRYP2002, Berlin, 2002: 83-107. doi: 10.1007/3-540- 46035-7_6. HUANG Q, WONG D S, and YANG G M. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095. FU X T, LI X W, and LIU W. IDPKC-to-TPKI construction of multi-receiver signcryption[C]. Proceedings of the INCoS(5), Washington, USA, 2013: 335-339. doi: 10.1109/ INCoS.2013.62. LI F G, ZHANG H, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012.2221897. LI F G, HAN Y Y, and JIN C H. Practical signcryption for secure communication of wireless sensor networks[J]. Wireless Personal Communications, 2016, 89(4): 1-22. doi: 10.1007/s11277-016-3327-4. 張玉磊, 張靈剛, 張永潔, 等. 匿名CLPKC-TPKI異構(gòu)簽密方案[J]. 電子學(xué)報(bào), 2016, 44 (10): 2432-2439. doi: 10.3969/ j.issn.0372-2112.2016.10.022. ZHANG Y L, ZHANG L G, ZHANG Y J, et al. CLPKC- to-TPKI heterogeneous signcryption scheme with anonymity [J]. Acta Electronica Sinica, 2016, 44(10): 2432-2439. doi: 10.3969/j.issn.0372-2112.2016.10.022. 周彥偉, 楊波, 張文政. 可證安全的高效無證書廣義簽密方案[J].計(jì)算機(jī)學(xué)報(bào), 2016, 39(3): 543-551. doi: 10.11897/SP.J. 1016.2016.00543. ZHOU Y W, YANG B, and ZHANG W Z. Provably secure and efficient certificateless generalized signcryption[J]. Chinese Journal of Computers, 2016, 39(3): 543-551. doi: 10.11897/ SP.J.1016.2016.00543. LI F G, HAN Y Y, and JIN C H. Practical access control for sensor networks in the context of the Internet of Things[J]. Computer Communications, 2016, 89-90: 154-164. doi: 10.1016/j.comcom.2016.03.007. 張玉磊, 王歡, 李臣意, 等. 可證安全的緊致無證書聚合簽密方案[J].電子與信息學(xué)報(bào), 2015, 37(12): 2838-2844. doi: 10.11999 /JEIT150407. ZHANG Y L, WANG H, LI C Y, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407. BARBOSA M and FARSHIM P. Certificateless signcryption [C]. Proceedings of ASIACCS 2008, Tokyo, 2008: 369-372. doi: 10.1145/1368310.1368364. POINTCHEVAL D and STERN J. Security arguments for digital dignatures and blind signatures[J]. Journal of Cryptology, 2001, 13(3): 361-396. doi: 10.1007/s 001450010003. LI C K, YANG M, WONG D S, et al. An efficient signcryption scheme with key privacy and its extension to ring signcryption[J]. Journal of Computer Security, 2010, 18(3): 451-473. doi: 10.3233/JCS-2009-0374. 路秀華, 溫巧燕, 王勵(lì)成. 格上的異構(gòu)簽密[J]. 電子科技大學(xué)學(xué)報(bào), 2016, 45(3): 458-462. doi: 10.3969/j.issn.1001-0548. 2016.02.025. LU X H, WEN Q Y, and WANG L C. A lattice-based heterogeneous signcryption[J]. Journal of University of Electronic Science and Technology of China, 2016, 45(3): 458-462. doi: 10.3969/j.issn.1001-0548.2016.02.025. -
計(jì)量
- 文章訪問數(shù): 1264
- HTML全文瀏覽量: 179
- PDF下載量: 272
- 被引次數(shù): 0