新的具有隱私保護功能的異構聚合簽密方案
doi: 10.11999/JEIT180249
-
西北師范大學計算機科學與工程學院 ??蘭州 ??730070
基金項目: 國家自然科學基金(61163038, 61262056, 61262057),甘肅省高等學??蒲许椖?2017A-003, 2018A-207)
New Privacy Preserving Aggregate Signcryption for Heterogeneous Systems
-
College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China
Funds: The National Natural Science Foundation of China (61163038, 61262056, 61262057), The Higher Educational Scientific Research Foundation of Gansu Province (2017A-003, 2018A-207)
-
摘要: 異構聚合簽密方案不僅可以保證異構密碼系統(tǒng)之間數據的機密性和不可偽造性,而且可以提供多個密文批量驗證。該文分析了一個具有隱私保護功能的異構聚合簽密方案的安全性,指出該方案不能抵擋惡意密鑰生成中心(KGC)攻擊,惡意KGC可以偽造有效的單密文和聚合密文。為了提高原方案的安全性,該文提出一種新的具有隱私保護功能的異構聚合簽密方案。該方案克服了原方案存在的安全性問題,實現了無證書密碼環(huán)境到身份密碼環(huán)境之間的數據安全傳輸,在隨機預言機模型下證明新方案的安全性。效率分析表明新方案與原方案效率相當。Abstract: The privacy preserving aggregate signcryption for heterogeneous systems can ensure the confidentiality and unforgeability of the data between heterogeneous cryptosystems, it also can provide multi-ciphertext batch verification. This paper analyzes the security of a scheme with privacy-preserving aggregate signcryption heterogeneous, and points out that the scheme can not resist the attack of malicious Key Generating Center (KGC), it can forge a valid ciphertext. In order to improve the security of the original scheme, a new heterogeneous aggregation signature scheme with privacy protection function is proposed.The new scheme overcomes the security problems existing in the original scheme and ensures the data transmission between the certificateless public key cryptography and the identity-based public key cryptographic, and the security of the new scheme is proved under the random oracle model. Efficiency analysis shows that the new program is equivalent to the original one.
-
表 1 基本運算耗費的時間(ms)
${T_{{\rm{add}}}}$ ${T_{{\rm{pm}}}}$ ${T_p}$ ${T_H}$ ${T_h}$ 0.023 3.382 3.711 6.720 1.024 下載: 導出CSV
表 2 簽密方案效率比較
方案 簽密 解簽密 安全性 Niu方案 $(2n + 5){T_{{\rm{pm}}}} + {T_p} + 2{T_H}+ {T_h}$ $ + (n + 3){T_{{\rm{add}}}} \ge 41.849$ $n{T_{{\rm{pm}}}} + 5{T_p} + 3{T_H} + {T_h}$ $ + (n + 1){T_{{\rm{add}}}} \ge 42.143$ 低 本文方案 $(2n + 5){T_{{\rm{pm}}}} + {T_p} + {\rm{3}}{T_H} + {T_h}$ $ + (n + 3){T_{{\rm{add}}}} \ge 48.569$ $n{T_{{\rm{pm}}}} + 5{T_p} + 3{T_H} + {T_h}$ $ + (n + 1){T_{{\rm{add}}}} \ge 42.143$ 高 下載: 導出CSV
-
ZHENG Yuliang. Digital signcryption or how to achieve cost(signature & encryption)<<cost(signature)+cost (encryption)[C]. Proceedings of the Cryptology-CRYPTO, 1997: 165–179. 杜慶靈. 基于身份的動態(tài)群通信簽密方案[J]. 信息網絡安全, 2017(9): 42–44 doi: 10.3969/j.issn.1671-1122.2017.09.010DU Qingling. Identity based dynamic group communication signcryption scheme[J]. Netinfo Security, 2017(9): 42–44 doi: 10.3969/j.issn.1671-1122.2017.09.010 劉明燁, 韓益亮, 楊曉元. 基于準循環(huán)低密度奇偶校驗碼的簽密方案研究[J]. 信息網絡安全, 2016(11): 66–72 doi: 10.3969/j.issn.1671-1122.2016.11.011LIU Mingye, HAN Yiliang, and YANG Xiaoyuan. Research of signcyption based on QC-LDC[J]. Netinfo Security, 2016(11): 66–72 doi: 10.3969/j.issn.1671-1122.2016.11.011 SELVI S, VIVEK S, SHRIRAM J, et al. Identity based aggregate signcryption schemes[C]. International Conference on Cryptology in India, New Delhi, India, 2009: 378–397. BABAMIR F S and EALAMI Z. Data security in unattended wireless sensor networks through aggregate signcryption[J].KSII Transactions on Internet&Information Systems, 2012, 6(11): 2940–2955 doi: 10.3837/tiis.2012.10.011 HAN Yiliang, LU Wanyi, and ZHANG Jian. Identity based aggregate signcryption scheme[J]. Lecture Notes in Electrical Engineering, 2014, 273(7): 383–389 doi: 10.1007/978-3-642-40640-9-48 EALAMI Z snd NASROLLAH P. Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University Computer and Information Sciences, 2014, 26(3): 276–286 doi: 10.1016/j.jksuci.2014.03.006 SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Science China Information Sciences, 2010, 53(3): 557–566 doi: 10.1007/s11432-010-0061-5 HUANG Qiong, WONG D S, and YANG Guomin. Heterogeneous signcryption with key privacy[J]. The Computer Journal, 2011, 54(4): 525–536 doi: 10.1093/comjnl/bxq095 LI Fagen, ZHANG Hui, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420–429 doi: 10.1109/JSYST.2012.2221897 牛淑芬, 牛靈, 王彩芬, 等. 一種可證安全的異構聚合簽密方案[J]. 電子與信息學報, 2017, 39(5): 1213–1218 doi: 10.11999/JEIT160829NIU Shufen, NIU Ling, WANG Caifen, et al. A provable aggregate signcryption for heterogeneous systems[J]. Journal of Electronics&Information Technology, 2017, 39(5): 1213–1218 doi: 10.11999/JEIT160829 王彩芬, 李亞紅, 張玉磊, 等. 標準模型下高效的異構簽密方案[J]. 電子與信息學報, 2017, 39(4): 881–886 doi: 10.11999/JEIT160662WANG Caifen, LI Yahong, ZHANG Yulei, et al. Efficient heterogeneous signcryption scheme in the standard model[J]. Journal of Electronics&Information Technology, 2017, 39(4): 881–886 doi: 10.11999/JEIT160662 張玉磊, 王歡, 劉文靜, 等 . 異構雙向簽密方案的安全性分析和改進[J]. 電子與信息學報, 2017, 39(12): 3045–3050 doi: 10.11999/JEIT170203ZHANG Yulei, WANG Huan, LIU Wenjing, et al. Security analysis and improvement of mutual signcryption schemes under heterogeneous systems[J]. Journal of Electronics&Information Technology, 2017, 39(12): 3045–3050 doi: 10.11999/JEIT170203 張玉磊, 張靈剛, 王彩芬, 等. 可證安全的IDPKC-to-CLPKC異構簽密方案[J]. 電子與信息學報, 2017, 39(9): 2127–2133 doi: 10.11999/JEIT170062ZHANG Yulei, ZHANG Linggang, WANG Caifen, et al. Provable secure IDPKC-to-CLPKC heterogeneous signcryption scheme[J]. Journal of Electronics&Information Technology, 2017, 39(9): 2127–2133 doi: 10.11999/JEIT170062 劉景偉, 張俐歡, 孫蓉. 異構系統(tǒng)下的雙向簽密方案[J]. 電子與信息學報, 2016, 38(11): 2948–2953 doi: 10.11999/JEIT160056LIU Jingwei, ZHANG Lihuan, and SUN Rong. Mutual signcryption schemes under heterogeneous systems[J]. Journal of Electronics&Information Technology, 2016, 38(11): 2948–2953 doi: 10.11999/JEIT160056 NIU Shufen, LI Zhenbin, and WANG Caifen. Privacy-Preserving Multi-party Aggregate Signcryption for Heterogeneous Systems[C]. International Conference on Cloud Computing and Security, Nanjing, China, 2017: 216–229. -
表(2)
計量
- 文章訪問數: 2078
- HTML全文瀏覽量: 640
- PDF下載量: 47
- 被引次數: 0