具有內(nèi)部安全性的常數(shù)對無證書聚合簽密方案
doi: 10.11999/JEIT170419
-
1.
(甘肅衛(wèi)生職業(yè)學院 蘭州 730000)
-
2.
(西北師范大學計算機科學與工程學院 蘭州 730070)
國家自然科學基金(61163038,61262056), 甘肅省高等學??蒲许椖?2017A-003, 2015B-220)
Certificateless Aggregate Signcryption Scheme with Internal Security and Const Pairings
-
1.
(Gansu Health Vocational College, Lanzhou 730000, China)
-
2.
(College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China)
The National Natural Science Foundation of China (61163038, 61262056), The Higher Educational Scientific Research Foundation of Gansu Province (2017A-003, 2015B-220)
-
摘要: 聚合簽密不僅能夠減少密文的驗證計算量,而且能夠保證數(shù)據(jù)的機密性和認證性。該文分析劉等人(2016)提出的無證書聚合簽密(CLASC)方案,指出第2類攻擊者可以偽造密文,劉方案不滿足適應(yīng)性選擇密文攻擊的不可區(qū)分性和適應(yīng)性選擇消息攻擊的不可偽造性。為了提升CLASC方案的安全級別和聚合驗證效率,該文提出CLASC的內(nèi)部安全模型和具有內(nèi)部安全性的CLASC方案。該方案聚合驗證密文只需要3個雙線性對,與現(xiàn)有同類方案相比,具有較高的驗證效率?;谟嬎鉊iffie-Hellman困難假設(shè),證明新方案在隨機預(yù)言模型下,滿足CLASC內(nèi)部安全模型下的機密性和不可偽造性。
-
關(guān)鍵詞:
- 無證書簽密 /
- 聚合簽密 /
- 內(nèi)部安全性 /
- 計算Diffie-Hellman困難問題 /
- KGC攻擊
Abstract: Aggregate signcryption can not only reduce the cost of the verification of ciphertexts, but also ensure the confidentiality and authentication. Analyzed Liu et al s CertificateLess Aggregate SignCryption (CLASC) scheme with Const Pairings, it is found that type II adversary, who is the malicious key generator center, could forge the ciphertexts. It means that Liu et als scheme does not satisfy the indistinguishability under the adaptive chosen ciphertext attacks and unforgeability under the adaptive chosen message attacks. In order to improve the security level and verification efficiency of CLASC scheme, in this paper, the internal secure model of CLASC is defined and a concrete CLASC scheme with this property is presented. As the new scheme only needs 3 bilinear pairingis, it is more efficient than existing CLASC schemes. Based on the assumption of computational Diffie-Hellman, in the random oracle model and the internal security mode of CLASC, the new schems is proved to satisfy the confidentiality, unforgeability and public verification. -
ZHENG Y L. Digital signcryption or how to achieve cost (signature encryption)cost (signature)+cost (encryption)[C]. Proceedings of the Cryptology-CRYPTO 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234. BAEK J, STEINFELD R, and ZHENG Yu-liang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology-PKC2002, Paris, France, 2002: 81-98. doi: 10.1007/s00145-007-0211-0. AN J H, DODIS Y, and RABIN T. On the security of joint signature and encryption[C]. Proceedings of the Cryptography-EUROCRYPT 2002, Netherlands, 2002: 83-107. doi: 10.1007/3-540-46035-7_6. SELVI S S D, VIVEK S S, SHRIRAM J, et al. Identity based aggregate signcryption schemes[C]. Proceedings of the Cryptology-INDOCRYPT 2009, New Delhi, India, 2009: 378-397. doi: 10.1007/978-3-642-10628-6_25. 張玉磊, 李臣意, 王彩芬, 等. 無證書聚合簽名方案的安全性分析和改進[J]. 電子與信息學報, 2015, 37(8): 1994-1999. doi: 10.11999/JEIT141635. ZHANG Y L, LI C Y, WANG C F, et al. Security analysis and improvements of certificateless aggregate signature schemes[J]. Journal of Electronics Information Technology, 2015, 37(8): 1994-1999. doi: 10.11999/JEIT141635. LU H J and XIE Q. An efficient certificateless aggregate signcryption scheme from pairings[C]. IEEE Proceedings of International Conference on the Electronics, Communications and Control (ICECC), Ningbo, China, 2011: 132-135. doi: 10.1109/ICECC.2011.6067635. JIANG Y, LI J P, and XIONG A P. Certificateless aggregate signcryption scheme for wireless sensor network[J]. International Journal of Advancements in Computing Technology, 2013, 5(8): 456-463. doi: 10.4156/ijact.vol5. issue8.51. ESLAMI Z and NASROLLAH P. Certificateless aggregate signcryption: security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. doi: 10.1016/j.jksuci.2014.03.006. 劉建華, 毛可飛, 胡俊偉. 基于雙線性對的無證書聚合簽密方案[J]. 計算機應(yīng)用, 2016, 36(6): 1558-1562. doi: 10.11772/ j.issn.1001-9081.2016.06.1558. LIU J H, MAO K F, and HU J W. Certificateless aggregate signcryption scheme based on bilinear pairings[J] Journal of Computer Applications, 2016, 36(6): 1558-1562. doi: 10.11772 /j.issn.1001-9081.2016.06.1558. 張玉磊, 王歡, 李臣意, 等. 可證安全的緊致無證書聚合簽密方案[J]. 電子與信息學報, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407. ZHANG Y L, WANG H, LI C Y, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407. CHEN J Q and REN X X. A privacy protection scheme based on certificateless aggregate signcryption and masking random number in smart grid[C]. The 4th International Conference on Mechanical Materials and Manufacturing Engineering (IC3ME2016), Shenzhen, China, 2016: 10-13. doi: 10.2991/ mmme-16.2016.3. 劉建華, 趙長嘯, 毛可飛. 高效的無證書聚合簽密方案[J]. 計算機工程與應(yīng)用, 2016, 52(12): 131-135. doi: 10.3778/j.issn. 1002-8331.1510-0193. LIU J H, ZHAO C X, and MAO K F. Efficient certificateless aggregate signcryption scheme based on XOR[J]. Computer Engineering and Applications, 2016, 52(12): 131-135. doi: 10.3778/j.issn.1002-8331.1510-0193. POINTCHEVAL D and STERN J. Security arguments for digital dignatures and blind signatures[J]. Journal of Cryptology, 2001, 13(3): 361-396. doi: 10.1007/s0014500 10003. CHENG L, WEN Q Y, JIN Z P, et al. Cryptanalysis and improvement of a certificateless aggregate signature scheme [J]. Information Sciences, 2015, 295(2): 337-346. doi: 10.1016 /j.ins.2014.09.065. -
計量
- 文章訪問數(shù): 1079
- HTML全文瀏覽量: 98
- PDF下載量: 130
- 被引次數(shù): 0