基于異構(gòu)密碼系統(tǒng)的混合群組簽密方案
doi: 10.11999/JEIT180554 cstr: 32379.14.JEIT180554
-
1.
西北師范大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院 ??蘭州 ??730070
-
2.
西北師范大學(xué)數(shù)學(xué)與統(tǒng)計(jì)學(xué)院 ??蘭州 ??730070
Hybrid Group Signcryption Scheme Based on Heterogeneous Cryptosystem
-
1.
College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China
-
2.
College of Mathematics and Statistics, Northwest Normal University, Lanzhou 730070, China
-
摘要:
群組簽密既能實(shí)現(xiàn)群組簽名,又能實(shí)現(xiàn)群組加密,但是現(xiàn)有的群組簽密方案的發(fā)送者和接收者基本上在同一個(gè)密碼系統(tǒng)中,不能滿足現(xiàn)實(shí)環(huán)境的需求,而且基本上采用的是公鑰加密技術(shù),公鑰加密技術(shù)在加密長(zhǎng)消息時(shí)效率較低。因此該文提出由基于身份的密碼體制(IBC)到無(wú)證書(shū)密碼體制(CLC)的異構(gòu)密碼系統(tǒng)的混合群組簽密方案。在該方案中,私鑰生成器(PKG)和密鑰生成中心(KGC)能夠分別在IBC密碼體制和CLC密碼體制中產(chǎn)生自己的系統(tǒng)主密鑰;而且群組成員只有協(xié)作才能解簽密,提高了方案的安全性;同時(shí)在無(wú)需更換群組公鑰和其他成員私鑰的情況下,用戶可以動(dòng)態(tài)地加入該群組。所提方案采用了混合簽密,具有可加密任意長(zhǎng)消息的能力。在隨機(jī)預(yù)言模型下,證明了該文方案在計(jì)算Diffie-hellman困難問(wèn)題下具有保密性和不可偽造性。通過(guò)理論和數(shù)值實(shí)驗(yàn)分析表明該方案具有更高的效率和可行性。
-
關(guān)鍵詞:
- 無(wú)證書(shū)密碼學(xué) /
- 異構(gòu)密碼系統(tǒng) /
- 混合簽密 /
- 基于身份的密碼學(xué) /
- 群組簽密
Abstract:Group signcryption is a cryptosystem which can realize group signature and group encryption. However, the message sender and receiver of existing group signcryption schemes are basically in the same cryptosystem, which does not meet the needs of the real environment and the public key encryption technology is basically used, public key encryption technology in encrypted long message efficiency is too low. Therefore, this paper proposes a hybrid group signcryption scheme based on heterogeneous cryptosystem from Identity-Based Cryptosystem (IBC) to CertificateLess Cryptosystem (CLC). In the scheme, The Private Key Generator (PKG) in the IBC cryptosystem and Key Generation Center (KGC) in the CLC cryptosystem generate their own system master keys, and group members can only solve signcryption through collaboration, which improves the security of the scheme. Meanwhile, the user can dynamically join the group without changing the group public key and other members’ private key. The scheme uses hybrid signcryption and has the ability to encrypt any long message. It is proved that the scheme satisfies confidentiality and unforgeability in computing the Diffie-hellman hard problem in the random oracle model. Theoretical and numerical analysis shows that the scheme is more efficient and feasible.
-
表 1 效率分析
方案 簽密階段運(yùn)算量 解簽密階段運(yùn)算量 簽密密文長(zhǎng)度 文獻(xiàn)[13] $(2{n^2} + 7n + 3){P_M} + 3{P_H}$ $({n^2} + n + 3){P_M} + 3{P_H}$ $2|{G_1}| + 3|{{Z}}_q^*|$ 文獻(xiàn)[15] $(2{n^2} + 3n + 2){P_M} + 3{P_H}$ $({n^2} + n + 2){P_M} + 3{P_H}$ $|{G_1}| + 3|{{Z}}_q^*|$ 本文 $(2n + 7){P_M} + 4{P_H}$ $(2n + 5){P_M} + 3{P_H}$ $|{G_1}| + 4|{{Z}}_q^*|$ 下載: 導(dǎo)出CSV
表 2 本文方案計(jì)算時(shí)間(s)
n 100 200 300 400 500 600 700 800 900 1000 簽密時(shí)間 1.1861 2.3375 3.6016 4.7899 5.9708 7.1283 8.1671 9.5163 10.7285 11.8963 解簽密時(shí)間 1.4792 1.5774 1.7442 1.8645 1.8991 1.9001 2.1469 2.3773 2.4658 2.5549 下載: 導(dǎo)出CSV
-
ZHENG Yuliang. Digital signcryption or how to achieve cost(signature & encryption) << cost(signature) +cost(encryption)[C]. Proceedings of the Cryptology-CRYPTO 1997, California, USA, 1997: 165–179. doi: 10.1007/BFb0052234. BAEK J, STEINFELD R, and ZHENG Yuliang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology-PKC2002, Paris, France, 2002: 81–98. doi: 10.1007/3-540-45664-3_6. 張宇, 陳晶, 杜瑞穎, 等. 適于車載網(wǎng)安全通信的高效簽密方案[J]. 電子學(xué)報(bào), 2015, 43(3): 512–517. doi: 10.3969/j.issn.0372-2112.2015.03.015ZHANG Yu, CHEN Jing, DU Ruiying, et al. An efficient signcryption scheme for secure communication of VANET[J]. Acta Electronica Sinica, 2015, 43(3): 512–517. doi: 10.3969/j.issn.0372-2112.2015.03.015 周才學(xué). 幾個(gè)簽密方案的密碼學(xué)分析與改進(jìn)[J]. 計(jì)算機(jī)工程與科學(xué), 2016, 38(11): 2246–2253. doi: 10.3969/j.issn.1007-130X.2016.11.014ZHOU Caixue. Cryptanalysis and improvement of some signcryption schemes[J]. Computer Engineering and Science, 2016, 38(11): 2246–2253. doi: 10.3969/j.issn.1007-130X.2016.11.014 王彩芬, 李亞紅, 張玉磊, 等. 標(biāo)準(zhǔn)模型下高效的異構(gòu)簽密方案[J]. 電子與信息學(xué)報(bào), 2017, 39(4): 881–886. doi: 10.11999/JEIT160662WANG Caifen, LI Yahong, ZHANG Yulei, et al. Efficient heterogeneous signcryption scheme under standard model[J]. Journal of Electronics &Information Technology, 2017, 39(4): 881–886. doi: 10.11999/JEIT160662 牛淑芬, 牛靈, 王彩芬, 等. 一種可證安全的異構(gòu)聚合簽密方案[J]. 電子與信息學(xué)報(bào), 2017, 39(5): 1213–1218. doi: 10.11999/JEIT160829NIU Shufen, NIU Ling, WANG Caifen, et al. A provable aggregate signcryption for heterogeneous systems[J]. Journal of Electronics &Information Technology, 2017, 39(5): 1213–1218. doi: 10.11999/JEIT160829 薛鵬. 混合加密的密鑰封裝算法研究與設(shè)計(jì)[D]. [博士論文], 西安電子科技大學(xué), 2014.XUE Peng. Research and design of hybrid encryption key encapsulation algorithm[D]. [Ph.D. dissertation], Xi’an University, 2014. YU Huifang and YANG Bo. Provably secure certificateless hybrid signcryption[J]. Chinese Journal of Computers, 2015, 38(4): 804–813. doi: 10.3724/SP.J.1016.2015.00804 盧萬(wàn)誼, 韓益亮, 楊曉元. 前向安全的可公開(kāi)驗(yàn)證無(wú)證書(shū)混合簽密方案[C]. 中國(guó)計(jì)算機(jī)學(xué)會(huì)服務(wù)計(jì)算學(xué)術(shù)會(huì)議, 西安, 中國(guó), 2012: 1–6.LU Wanyi, HAN Yiliang, and YANG Xiaoyuan. Forward secure publicly verifiable hybrid certificateless signcryption scheme[C]. Academic Conference on Service Computing of China Computer Society, Xi’an, China, 2012: 1–6. 周彥偉, 楊波, 王青龍. 可證安全的抗泄露無(wú)證書(shū)混合簽密機(jī)制[J]. 軟件學(xué)報(bào), 2016, 27(11): 2898–2911. doi: 10.13328/j.cnki.jos.004941ZHOU Yanwei, YANG Bo, and WANG Qinglong. Provably secure leakage-resilient certificateless hybrid signcryption scheme[J]. Journal of Software, 2016, 27(11): 2898–2911. doi: 10.13328/j.cnki.jos.004941 徐鵬, 薛偉. 可公開(kāi)驗(yàn)證的無(wú)證書(shū)混合簽密方案[J]. 計(jì)算機(jī)應(yīng)用與軟件, 2017(11): 278–283. doi: 10.3969/j.issn.1000-386x.2017.11.051XU Peng and XUE Wei. A publicly verifiable certificateless hybrid signcryption scheme[J]. Computer Application and Software, 2017(11): 278–283. doi: 10.3969/j.issn.1000-386x.2017.11.051 張波, 徐秋亮. 基于身份的面向群組簽密方案[C]. 中國(guó)計(jì)算機(jī)網(wǎng)絡(luò)與信息安全學(xué)術(shù)會(huì)議, 天津, 中國(guó), 2009: 23–28.ZHANG Bo and XU Qiuliang. Identity based group oriented signcryption scheme[C]. China Academic Conference on Computer Network and Information Security, Tianjin, China, 2009: 23–28. 陳尚弟, 卞廣旭. 一種新的基于身份的群體簽密方案[J]. 中國(guó)民航大學(xué)學(xué)報(bào), 2013, 31(1): 93–96. doi: 10.3969/j.issn.1674-5590.2013.01.022CHEN Shangdi and BIAN Guangxu. A new identity based group signcryption scheme[J]. Journal of Civil Aviation University of China, 2013, 31(1): 93–96. doi: 10.3969/j.issn.1674-5590.2013.01.022 馮君, 汪學(xué)明. 一種高安全的門限群簽密方案[J]. 計(jì)算機(jī)應(yīng)用研究, 2013, 30(2): 503–506. doi: 10.3969/j.issn.1001-3695.2013.02.051FENG Jun and WANG Xueming. A high security threshold group signcryption scheme[J]. Computer Application Research, 2013, 30(2): 503–506. doi: 10.3969/j.issn.1001-3695.2013.02.051 PENG Changgen, LI Xiang, and LUO Wenjun. A generalized group-oriented threshold signcryption schemes[J]. Acta Electronica Sinica, 2007, 35(1): 64–67. POINTCHEVAL D and STERN J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361–396. doi: 10.1007/s001450010003 -