摘要
签密是一种提供保密性和认证性的有效消息传输方式;但是当有很多消息接收者参与会话时,它的效率将变得比较低下。提出了一种多方混合签密安全模型。多方混合签密是一种在多方参与情况下,能够同时提供保密性、认证性与不可否认性的签密的通用方案。与传统方式相比较,在有多个参与者情况下,该方案将显著提高信息传输效率。首先提出了一种通用多方混合签密方案,然后给出一种具体方案;还将给出该方案在防火墙中应用的方法。
Signcryption is a confidential and authenticated way for message delivery. But it may cost expensively when the number of recipients becomes large. A new security notion called hybrid signcryption scheme for multiple parties is presented. Hybrid signcryption scheme for multiple parties is an efficient way that combine confidentiality and authenticity when communication in multiple parties. Compared to traditional security model,it can significantly improve efficiency. Firstly,a construction of hybrid signcryption scheme for multiple parties is presented,and then the application of this scheme in firewall is presented.
引文
1 Zheng Yuliang.Digital signcryption or how to achieve cost(signature&encryption)cost(signature)+cost(encryption).Advances in Cryptology,1997;1294:165—179
2 Barbosa M.Farshim P.Certificateless signcryption.ACM Symposium on Information,Computer and Communications Securyty-ASIACCS,2008:369—372
3 Cramer R,Shoup V.Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack.SIAM Journal on Computin,2004:167—226
4 Dent A W.A designer’s guide to KEMs.Cryptography and Coding,LNCS,2003;2898:133—151
5 Bjrstad T E.Hybrid signcryption.Practical Signcryption,2010;121 —147
6 Li Fagen.Certificateless hybrid signcryption.information security practice and experience.LNCS,2009;5451:112—123
7 Selvi S S D,Vivek S S,Rangan C P.Certificateless KEM and hybrid signcryption schemes revisited.Information Security Practice and Experience,LNCS,2010;6047:294—307
8 孙银霞,李晖,李小青.无证书体制下的多接收者签密密钥封装机制.电子与信息学报,2010;32(9):2249—2252Sun Yinxia,Li Hui,Li Xiaoqing.Certificateless signcryption KEM to multiple recipients.Journal of Electronics and Information Technology,2010;32(9):2249—2252
9 Douglas R S.Cryptography Theory and Practice.CRC Press,2002
10 Ronald C,Victor S.A practical public key cryptosystem provable secure against adaptive chosen ciphertext attack.Crypto,LNCS,1998;1462:13—25
11 Smart N P.Efficient key encapsulation to multiple parties.SecurityIn Communication Networks.LNCS,Springer-Verlag,2005;3352:208 —219
12 Wang Xuan,Yang Xiaoyuan,Zhang Jindan.Provable secure generalized signcryption.Journal of Computers,2010;5:807—814
13 Baek J,Steinfeld R,Zheng Yuliang.Formal proofs for the security of signcryption.Public Key Cryptography,LNCS,2002;2274:363 —366
14 David P,Jacques S.Security proofs for signature schemes.Eurocrypt Proceedings,LNCS,1996;1070:187—198