無證書公鑰密碼體制→傳統(tǒng)公鑰基礎(chǔ)設(shè)施異構(gòu)環(huán)境下部分盲簽密方案
doi: 10.11999/JEIT180850
-
1.
西北師范大學(xué) 計算機科學(xué)與工程學(xué)院? ?蘭州? ?730070
-
2.
深圳技術(shù)大學(xué) 大數(shù)據(jù)與互聯(lián)網(wǎng)學(xué)院? ?深圳? ?518118
Partial Blind Signcryption Scheme in CLPKC-to-TPKI Heterogeneous Environment
-
1.
College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China
-
2.
College of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, China
-
摘要: 該文提出在無證書公鑰密碼體制(CLPKC)和傳統(tǒng)公共密鑰基礎(chǔ)設(shè)施體制(TPKI)下部分盲簽密方案的形式化定義,并在此基礎(chǔ)上提出一個在CLPKC-TPKI環(huán)境下具有雙線性對的部分盲簽密方案。依據(jù)隨機預(yù)言模型,計算Diffie-Hellman困難問題(CDHP)和修改逆計算Diffie-Hellman困難問題(MICDHP)假設(shè),使得方案在異構(gòu)環(huán)境下滿足不可偽造性、機密性、部分盲性、不可跟蹤性、不可否認(rèn)性等性質(zhì)。最后和相關(guān)方案進行了比較分析,該文方案在增加了盲性同時并未顯著增加計算量的開銷。
-
關(guān)鍵詞:
- 異構(gòu)簽密 /
- 部分盲簽密 /
- 修改逆計算Diffie-Hellman困難問題
Abstract: The definition and security models of partial blind signcryption scheme in heterogeneous environment between CertificateLess Public Key Cryptography (CLPKC)and Traditional Public Key Infrastructure (TPKI) are proposed, and a construction by using the bilinear pairing is proposed. Under the random oracle model, based on the assumptions of Computational Diffie-Hellman Problem(CDHP) and Modifying Inverse Computational Diffie-Hellman(MICDHP), the scheme is proved to meet the requirment of the unforgeability, confidentiality, partial blindness, and untraceability, undeniability. Finally, compared with the related scheme, the scheme increases the blindness and does not significantly increase the computational cost. -
HU Xiaoming, LIU Yan, XU Huajie, et al. Analysis and improvement of certificateless signature and proxy re-signature schemes[C]. 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference, Chongqing, China, 2015: 166–170. doi: 10.1109/IAEAC.2015.7428540. JIANG M M, HU Y P, WANG B C, et al. Lattice‐based multi‐use unidirectional proxy re‐encryption[J]. Security and Communication Networks, 2015, 8(18): 3796–3803. doi: 10.1002/sec.1300 鄧宇喬, 杜明輝, 尤再來, 等. 一種基于標(biāo)準(zhǔn)模型的盲代理重簽名方案[J]. 電子與信息學(xué)報, 2010, 32(5): 1219–1223. doi: 10.3724/SP.J.1146.2009.00754DENG Yuqiao, DU Minghui, YOU Zailai, et al. A blind proxy re-signatures scheme based on standard model[J]. Journal of Electronics &Information Technology, 2010, 32(5): 1219–1223. doi: 10.3724/SP.J.1146.2009.00754 劉哲, 劉建偉, 伍前紅, 等. 車載網(wǎng)絡(luò)中安全有效分布式的假名生成[J]. 通信學(xué)報, 2015, 36(11): 33–40. doi: 10.11959/j.issn.1000-436x.2015253LIU Zhe, LIU Jianwei, WU Qianhong, et al. Secure and efficient distributed pseudonym generation in VANET[J]. Journal on Communications, 2015, 36(11): 33–40. doi: 10.11959/j.issn.1000-436x.2015253 李建民, 俞惠芳, 趙晨. UC安全的自認(rèn)證盲簽密協(xié)議[J]. 計算機科學(xué)與探索, 2017, 11(6): 932–940. doi: 10.3778/j.issn.1673-9418.1605047LI Jianmin, YU Huifang, and ZHAO Chen. Self-certified blind signcryption protocol with UC security[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(6): 932–940. doi: 10.3778/j.issn.1673-9418.1605047 傅曉彤, 陳思, 張寧. 基于代理的密碼貨幣支付系統(tǒng)[J]. 通信學(xué)報, 2017, 38(7): 199–206. doi: 10.11959/j.issn.1000-436x.2017121FU Xiaotong, CHEN Si, and ZHANG Ning. Proxy-cryptocurrency payment system[J]. Journal on Communications, 2017, 38(7): 199–206. doi: 10.11959/j.issn.1000-436x.2017121 SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Science China Information Sciences, 2010, 53(3): 557–566. doi: 10.1007/s11432-010-0061-5 HUANG Qiang, WONG D S, and YANG Guomin. Heterogeneous signcryption with key privacy[J]. The Computer Journal, 2011, 54(4): 525–536. doi: 10.1093/comjnl/bxq095 張玉磊, 張靈剛, 張永潔, 等. 匿名CLPKC-TPKI異構(gòu)簽密方案[J]. 電子學(xué)報, 2016, 44(10): 2432–2439. doi: 10.3969/j.issn.0372-2112.2016.10.022ZHANG Yulei, ZHANG Linggang, ZHANG Yongjie, et al. CLPKC-to-TPKI heterogeneous signcryption scheme with anonymity[J]. Acta Electronica Sinica, 2016, 44(10): 2432–2439. doi: 10.3969/j.issn.0372-2112.2016.10.022 馮濤, 彭偉, 馬建峰. 安全的無可信PKG的部分盲簽名方案[J]. 通信學(xué)報, 2010, 31(1): 128–134. doi: 10.3969/j.issn.1000-436X.2010.01.020FENG Tao, PENG Wei, and MA Jianfeng. Provably secure partially blind signature without trusted PKG[J]. Journal on Communications, 2010, 31(1): 128–134. doi: 10.3969/j.issn.1000-436X.2010.01.020 楊小東, 陳春霖, 楊平, 等. 可證安全的部分盲代理重簽名方案[J]. 通信學(xué)報, 2018, 39(2): 65–72. doi: 10.11959/j.issn.1000-436x.2018014YAGN Xiaodong, CHEN Chunlin, YANG Ping, et al. Partially blind proxy re-signature scheme with proven security[J]. Journal on Communications, 2018, 39(2): 65–72. doi: 10.11959/j.issn.1000-436x.2018014 BARBOSA M and FARSHIM P. Certificateless signcryption[C]. 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 2008: 369–372. 彭巧, 田有亮. 基于多線性Diffie-Hellman問題的秘密共享方案[J]. 電子學(xué)報, 2017, 45(1): 200–205. doi: 10.3969/j.issn.0372-2112.2017.01.027PENG Qiao and TIAN Youliang. A secret sharing scheme based on multilinear Diffie-Hellman problem[J]. Acta Electronica Sinica, 2017, 45(1): 200–205. doi: 10.3969/j.issn.0372-2112.2017.01.027 POINTCHEVAL D and STERN J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361–396. doi: 10.1007/s001450010003 牛淑芬, 楊喜艷, 王彩芬, 等. 基于異構(gòu)密碼系統(tǒng)的混合盲簽密方案[J]. 計算機工程, 2018, 44(8): 151–154, 160. doi: 10.19678/j.issn.1000-3428.0047898NIU Shufen, YANG Xiyan, WANG Caifen, et al. Hybrid blind signcryption scheme based on heterogeneous cryptosystem[J]. Computer Engineering, 2018, 44(8): 151–154, 160. doi: 10.19678/j.issn.1000-3428.0047898 -