一个高效的多方混合签密方案
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:An Efficient Hybrid Signcryption Scheme for Multiple Parties
  • 作者:黎忠文 ; 黎仁峰 ; 钟迪 ; 李发根
  • 英文作者:LI Zhong-wen;LI Ren-feng;ZHONG Di;LI Fa-gen;School of Information Science & Technology,Chengdu University;Key Laboratory of Pattern Recognition and Intelligent Information Processing,Institutions of Higher Education of Sichuan Province,Chengdu University;School of Computer Science & Engineering,University of Electronic Science and Technology of China;
  • 关键词:防火墙 ; 混合签密 ; 签密 ; 多方签密
  • 英文关键词:firewall key encapsulation mechanism signcryption signcryption for multiple parties
  • 中文刊名:KXJS
  • 英文刊名:Science Technology and Engineering
  • 机构:成都大学信息科学与技术学院;成都大学模式识别与智能信息处理四川省高校重点实验室;电子科技大学计算机科学与工程学院;
  • 出版日期:2014-06-18
  • 出版单位:科学技术与工程
  • 年:2014
  • 期:v.14;No.306
  • 基金:国家自然科学基金(61309015);; 四川省科技支撑计划项目(2013GZ0016);; 四川省教育厅科技项目(12ZB176,13ZA0296);; 校际合作项目(20804)资助
  • 语种:中文;
  • 页:KXJS201417017
  • 页数:5
  • CN:17
  • ISSN:11-4688/T
  • 分类号:89-92+102
摘要
签密是一种提供保密性和认证性的有效消息传输方式;但是当有很多消息接收者参与会话时,它的效率将变得比较低下。提出了一种多方混合签密安全模型。多方混合签密是一种在多方参与情况下,能够同时提供保密性、认证性与不可否认性的签密的通用方案。与传统方式相比较,在有多个参与者情况下,该方案将显著提高信息传输效率。首先提出了一种通用多方混合签密方案,然后给出一种具体方案;还将给出该方案在防火墙中应用的方法。
        Signcryption is a confidential and authenticated way for message delivery. But it may cost expensively when the number of recipients becomes large. A new security notion called hybrid signcryption scheme for multiple parties is presented. Hybrid signcryption scheme for multiple parties is an efficient way that combine confidentiality and authenticity when communication in multiple parties. Compared to traditional security model,it can significantly improve efficiency. Firstly,a construction of hybrid signcryption scheme for multiple parties is presented,and then the application of this scheme in firewall is presented.
引文
1 Zheng Yuliang.Digital signcryption or how to achieve cost(signature&encryption)cost(signature)+cost(encryption).Advances in Cryptology,1997;1294:165—179
    2 Barbosa M.Farshim P.Certificateless signcryption.ACM Symposium on Information,Computer and Communications Securyty-ASIACCS,2008:369—372
    3 Cramer R,Shoup V.Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack.SIAM Journal on Computin,2004:167—226
    4 Dent A W.A designer’s guide to KEMs.Cryptography and Coding,LNCS,2003;2898:133—151
    5 Bjrstad T E.Hybrid signcryption.Practical Signcryption,2010;121 —147
    6 Li Fagen.Certificateless hybrid signcryption.information security practice and experience.LNCS,2009;5451:112—123
    7 Selvi S S D,Vivek S S,Rangan C P.Certificateless KEM and hybrid signcryption schemes revisited.Information Security Practice and Experience,LNCS,2010;6047:294—307
    8 孙银霞,李晖,李小青.无证书体制下的多接收者签密密钥封装机制.电子与信息学报,2010;32(9):2249—2252Sun Yinxia,Li Hui,Li Xiaoqing.Certificateless signcryption KEM to multiple recipients.Journal of Electronics and Information Technology,2010;32(9):2249—2252
    9 Douglas R S.Cryptography Theory and Practice.CRC Press,2002
    10 Ronald C,Victor S.A practical public key cryptosystem provable secure against adaptive chosen ciphertext attack.Crypto,LNCS,1998;1462:13—25
    11 Smart N P.Efficient key encapsulation to multiple parties.SecurityIn Communication Networks.LNCS,Springer-Verlag,2005;3352:208 —219
    12 Wang Xuan,Yang Xiaoyuan,Zhang Jindan.Provable secure generalized signcryption.Journal of Computers,2010;5:807—814
    13 Baek J,Steinfeld R,Zheng Yuliang.Formal proofs for the security of signcryption.Public Key Cryptography,LNCS,2002;2274:363 —366
    14 David P,Jacques S.Security proofs for signature schemes.Eurocrypt Proceedings,LNCS,1996;1070:187—198

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700