基于異構密碼系統(tǒng)的混合群組簽密方案
doi: 10.11999/JEIT180554
-
1.
西北師范大學計算機科學與工程學院 ??蘭州 ??730070
-
2.
西北師范大學數學與統(tǒng)計學院 ??蘭州 ??730070
Hybrid Group Signcryption Scheme Based on Heterogeneous Cryptosystem
-
1.
College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China
-
2.
College of Mathematics and Statistics, Northwest Normal University, Lanzhou 730070, China
-
摘要:
群組簽密既能實現群組簽名,又能實現群組加密,但是現有的群組簽密方案的發(fā)送者和接收者基本上在同一個密碼系統(tǒng)中,不能滿足現實環(huán)境的需求,而且基本上采用的是公鑰加密技術,公鑰加密技術在加密長消息時效率較低。因此該文提出由基于身份的密碼體制(IBC)到無證書密碼體制(CLC)的異構密碼系統(tǒng)的混合群組簽密方案。在該方案中,私鑰生成器(PKG)和密鑰生成中心(KGC)能夠分別在IBC密碼體制和CLC密碼體制中產生自己的系統(tǒng)主密鑰;而且群組成員只有協作才能解簽密,提高了方案的安全性;同時在無需更換群組公鑰和其他成員私鑰的情況下,用戶可以動態(tài)地加入該群組。所提方案采用了混合簽密,具有可加密任意長消息的能力。在隨機預言模型下,證明了該文方案在計算Diffie-hellman困難問題下具有保密性和不可偽造性。通過理論和數值實驗分析表明該方案具有更高的效率和可行性。
-
關鍵詞:
- 無證書密碼學 /
- 異構密碼系統(tǒng) /
- 混合簽密 /
- 基于身份的密碼學 /
- 群組簽密
Abstract:Group signcryption is a cryptosystem which can realize group signature and group encryption. However, the message sender and receiver of existing group signcryption schemes are basically in the same cryptosystem, which does not meet the needs of the real environment and the public key encryption technology is basically used, public key encryption technology in encrypted long message efficiency is too low. Therefore, this paper proposes a hybrid group signcryption scheme based on heterogeneous cryptosystem from Identity-Based Cryptosystem (IBC) to CertificateLess Cryptosystem (CLC). In the scheme, The Private Key Generator (PKG) in the IBC cryptosystem and Key Generation Center (KGC) in the CLC cryptosystem generate their own system master keys, and group members can only solve signcryption through collaboration, which improves the security of the scheme. Meanwhile, the user can dynamically join the group without changing the group public key and other members’ private key. The scheme uses hybrid signcryption and has the ability to encrypt any long message. It is proved that the scheme satisfies confidentiality and unforgeability in computing the Diffie-hellman hard problem in the random oracle model. Theoretical and numerical analysis shows that the scheme is more efficient and feasible.
-
表 1 效率分析
方案 簽密階段運算量 解簽密階段運算量 簽密密文長度 文獻[13] $(2{n^2} + 7n + 3){P_M} + 3{P_H}$ $({n^2} + n + 3){P_M} + 3{P_H}$ $2|{G_1}| + 3|{{Z}}_q^*|$ 文獻[15] $(2{n^2} + 3n + 2){P_M} + 3{P_H}$ $({n^2} + n + 2){P_M} + 3{P_H}$ $|{G_1}| + 3|{{Z}}_q^*|$ 本文 $(2n + 7){P_M} + 4{P_H}$ $(2n + 5){P_M} + 3{P_H}$ $|{G_1}| + 4|{{Z}}_q^*|$ 下載: 導出CSV
表 2 本文方案計算時間(s)
n 100 200 300 400 500 600 700 800 900 1000 簽密時間 1.1861 2.3375 3.6016 4.7899 5.9708 7.1283 8.1671 9.5163 10.7285 11.8963 解簽密時間 1.4792 1.5774 1.7442 1.8645 1.8991 1.9001 2.1469 2.3773 2.4658 2.5549 下載: 導出CSV
-
ZHENG Yuliang. Digital signcryption or how to achieve cost(signature & encryption) << cost(signature) +cost(encryption)[C]. Proceedings of the Cryptology-CRYPTO 1997, California, USA, 1997: 165–179. doi: 10.1007/BFb0052234. BAEK J, STEINFELD R, and ZHENG Yuliang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology-PKC2002, Paris, France, 2002: 81–98. doi: 10.1007/3-540-45664-3_6. 張宇, 陳晶, 杜瑞穎, 等. 適于車載網安全通信的高效簽密方案[J]. 電子學報, 2015, 43(3): 512–517. doi: 10.3969/j.issn.0372-2112.2015.03.015ZHANG Yu, CHEN Jing, DU Ruiying, et al. An efficient signcryption scheme for secure communication of VANET[J]. Acta Electronica Sinica, 2015, 43(3): 512–517. doi: 10.3969/j.issn.0372-2112.2015.03.015 周才學. 幾個簽密方案的密碼學分析與改進[J]. 計算機工程與科學, 2016, 38(11): 2246–2253. doi: 10.3969/j.issn.1007-130X.2016.11.014ZHOU Caixue. Cryptanalysis and improvement of some signcryption schemes[J]. Computer Engineering and Science, 2016, 38(11): 2246–2253. doi: 10.3969/j.issn.1007-130X.2016.11.014 王彩芬, 李亞紅, 張玉磊, 等. 標準模型下高效的異構簽密方案[J]. 電子與信息學報, 2017, 39(4): 881–886. doi: 10.11999/JEIT160662WANG Caifen, LI Yahong, ZHANG Yulei, et al. Efficient heterogeneous signcryption scheme under standard model[J]. Journal of Electronics &Information Technology, 2017, 39(4): 881–886. doi: 10.11999/JEIT160662 牛淑芬, 牛靈, 王彩芬, 等. 一種可證安全的異構聚合簽密方案[J]. 電子與信息學報, 2017, 39(5): 1213–1218. doi: 10.11999/JEIT160829NIU Shufen, NIU Ling, WANG Caifen, et al. A provable aggregate signcryption for heterogeneous systems[J]. Journal of Electronics &Information Technology, 2017, 39(5): 1213–1218. doi: 10.11999/JEIT160829 薛鵬. 混合加密的密鑰封裝算法研究與設計[D]. [博士論文], 西安電子科技大學, 2014.XUE Peng. Research and design of hybrid encryption key encapsulation algorithm[D]. [Ph.D. dissertation], Xi’an University, 2014. YU Huifang and YANG Bo. Provably secure certificateless hybrid signcryption[J]. Chinese Journal of Computers, 2015, 38(4): 804–813. doi: 10.3724/SP.J.1016.2015.00804 盧萬誼, 韓益亮, 楊曉元. 前向安全的可公開驗證無證書混合簽密方案[C]. 中國計算機學會服務計算學術會議, 西安, 中國, 2012: 1–6.LU Wanyi, HAN Yiliang, and YANG Xiaoyuan. Forward secure publicly verifiable hybrid certificateless signcryption scheme[C]. Academic Conference on Service Computing of China Computer Society, Xi’an, China, 2012: 1–6. 周彥偉, 楊波, 王青龍. 可證安全的抗泄露無證書混合簽密機制[J]. 軟件學報, 2016, 27(11): 2898–2911. doi: 10.13328/j.cnki.jos.004941ZHOU Yanwei, YANG Bo, and WANG Qinglong. Provably secure leakage-resilient certificateless hybrid signcryption scheme[J]. Journal of Software, 2016, 27(11): 2898–2911. doi: 10.13328/j.cnki.jos.004941 徐鵬, 薛偉. 可公開驗證的無證書混合簽密方案[J]. 計算機應用與軟件, 2017(11): 278–283. doi: 10.3969/j.issn.1000-386x.2017.11.051XU Peng and XUE Wei. A publicly verifiable certificateless hybrid signcryption scheme[J]. Computer Application and Software, 2017(11): 278–283. doi: 10.3969/j.issn.1000-386x.2017.11.051 張波, 徐秋亮. 基于身份的面向群組簽密方案[C]. 中國計算機網絡與信息安全學術會議, 天津, 中國, 2009: 23–28.ZHANG Bo and XU Qiuliang. Identity based group oriented signcryption scheme[C]. China Academic Conference on Computer Network and Information Security, Tianjin, China, 2009: 23–28. 陳尚弟, 卞廣旭. 一種新的基于身份的群體簽密方案[J]. 中國民航大學學報, 2013, 31(1): 93–96. doi: 10.3969/j.issn.1674-5590.2013.01.022CHEN Shangdi and BIAN Guangxu. A new identity based group signcryption scheme[J]. Journal of Civil Aviation University of China, 2013, 31(1): 93–96. doi: 10.3969/j.issn.1674-5590.2013.01.022 馮君, 汪學明. 一種高安全的門限群簽密方案[J]. 計算機應用研究, 2013, 30(2): 503–506. doi: 10.3969/j.issn.1001-3695.2013.02.051FENG Jun and WANG Xueming. A high security threshold group signcryption scheme[J]. Computer Application Research, 2013, 30(2): 503–506. doi: 10.3969/j.issn.1001-3695.2013.02.051 PENG Changgen, LI Xiang, and LUO Wenjun. A generalized group-oriented threshold signcryption schemes[J]. Acta Electronica Sinica, 2007, 35(1): 64–67. POINTCHEVAL D and STERN J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361–396. doi: 10.1007/s001450010003 -