期刊文献+

基于无证书的盲签密方案 被引量:6

CERTIFICATELESS BASED BLIND SIGNCRYPTION SCHEME
在线阅读 下载PDF
导出
摘要 在传统数字签名机制中,用户的公钥需要由经过可信第三方(TTP)签名的证书来保证其可靠性,而Sham ir的基于身份的签名机制尽管不再需要证书,但用户的私钥将无法避免地被TTP所托管。结合无证书公钥技术和盲签密思想,使用双线性对提出了一个新的基于无证书的盲签密方案。分析表明,新方案保持了盲签密的各种安全特性;解决了基于证书和基于身份密码体制中的证书存在的问题和密钥托管问题;在计算量方面,该方案只需两次双线性对运算,效率非常高。 In traditional digital signature schemes,certificates signed by a trusted party(TTP) are required to ensure authenticity of the public keys of users.Shamir's identity-based public key cryptography does not need the certificates,however,the key escrow of user's private key is inherent.In the paper,we propose a new certificateless blind signcryption scheme from bilinear pairings by applying the concept of certificateless public key to blind signcryption.Under the condition of keeping all kinds of security characteristics of blind signcryption,it is showed that the new scheme does not need the certificates of the public keys in the certificate-based cryptography and overcomes the inherent key escrow problem in the identity-based cryptography;Furthermore,it only requires two pairings operations,so its efficiency is very high.
出处 《计算机应用与软件》 CSCD 2010年第7期71-73,共3页 Computer Applications and Software
基金 教育部科学技术研究重点项目(208148)
关键词 无证书公钥 盲签密 双线性对 无证书盲签密 Certificateless public key Blind signcryption Bilinear pairings Certificateless blind signcryption
  • 相关文献

参考文献7

  • 1Al-Riyami S,Paterson K.Certificateless public key cryptography[C]//Advances in Cryptology proceeding of Asiacrypt 2003,Lecture Notes in Computer Science 2894,Berlin:Springer-Verlag,2003:452-473.
  • 2Yum D,Lee P.Generic construction of certificateless signature[C]//Advances in ACISP 2004,Lecture Notes in Computer Science 3108.Berlin:Springer-Verlag,2004:200-211.
  • 3Hu B,Wong D,Zhang Z,et al.Key replacement attack against a generic construction of certificateless signature[C]//Advances in Privacy ACISP 2006,Lecture Notes in Computer Science 4058,Berlin:Springer-Verlag,2006:235-246.
  • 4Li X,Chen K,Sun L.Certificateless signature and proxy signature schemes from bilinear pairings[J].Lithuanian Mathematical Journal,2005,45(1):76-83.
  • 5Wang L,Cao Z,Li X,et al.Certificateless threshold signature schemes[C]//Advances in CIS 2005,Lecture Notes in Artificial Intelligence 3802,Berlin Springer-Verlag,2005:104-109.
  • 6Huang Xinyi,Susilo Willy,Mu Yi,et al.Certificateless designated verifier signature schemes[C]//Proceedings of the 20th International Conference on Advanced Information Networking and Applications(AINA06),Vienna,Austria.Piscataway,NJ,USA:IEEE,2006:15-19.
  • 7Tsz Hon Yuen,Victor K Wei.Fast and Proven Secure Blind Identity Based Signcryption from Pairings[C]//CT RSA 2005,Lecture Notes in Computer Science 3376,Berlin:Springer-Verlag,2005:305-322.

同被引文献77

  • 1祁正华,杨庚,任勋益.Provably Secure Certificateless Ring Signcryption Scheme[J].China Communications,2011,8(3):99-106. 被引量:11
  • 2S. S. AI--Riyami and K. G. Paterson. Certificateless public key cryptography[A]. In: Advances in Cryptology- ASIACRYPT 2003. Lecture Notes in Computer Seience: vol 2894[C]. Berlin: Springer-Verlag, 2003: 452-473.
  • 3C. Wu and Z. Chen. A new efficient certificateless signcryption scheme[A]. In: International Symposium on Information Science and Engieering: vol 1 [C]. USA:IEEE, 2008: 661-664.
  • 4S. S. D. Selvi, S. S. Vivek, and C. P. Ragan. On thesecurityof certificateless signcryption schemes[EB/OL]. Cryptology ePrint Archive:Report 2009/298, Availablefrom: http://Eprintiaer. org/2009/298.
  • 5B. Waters. Efficient identity--basedeneryption without random oracles[A]. In : Advances in Cryptology-EUROCRYPT 2005. Lecture Notes in Computer Science: vol 3494 [C]. Berlin: Springer- Verlag, 2005: 114--127.
  • 6Z. Liu, Y. Hu, X. Zhang, and H. Ma. Certifieateless signcryption scheme in the standard model [J]. Information Sciences, 2010, 180(3): 452-464.
  • 7Chaum D. Blind signature for untraceable payments[C]//Proceedingsof CRYPTO'82. Berlin: Plenum Press, 1993: 199-203.
  • 8Tsz Hon Yuen, Victor K Wei. Fast and Proven Secure Blind Identity- Based Signcryp tion from Pairings[C] / /CT2RSA 2005, Lecture Notes in Computer Science 3376, Berlin:Springer2Verlag, 2005: 305 -322.
  • 9J. Baek, R Steinfeld, and Y. Zheng. Formal proofs for the security of signcryption[J]. Journal of Cryptology, 2007, 20(2): 203- 235.
  • 10M. Barbosa and P. Farshim. Certificateless signcryption [EB/ OL]. CryptologyePrint Archive: Report 2008/143, Available from : http ://eprint. iacr. org/2008/143.

引证文献6

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部