首页 | 本学科首页   官方微博 | 高级检索  
     

匿名CLPKC-TPKI异构签密方案
引用本文:张玉磊,张灵刚,张永洁,王欢,王彩芬.匿名CLPKC-TPKI异构签密方案[J].电子学报,2016,44(10):2432-2439.
作者姓名:张玉磊  张灵刚  张永洁  王欢  王彩芬
作者单位:1. 西北师范大学计算机科学与工程学院,甘肃兰州,730070;2. 甘肃卫生职业学院,甘肃兰州,730000
基金项目:国家自然科学基金(No.61163038,No.61262056,No.61262057);甘肃省高等学校科研项目(No.2015B-220,No.2013A-014);西北师范大学青年教师科研能力提升计划项目(NWNU-LKQN-12-32)
摘    要:异构签密可以保证不同公钥密码系统之间数据传输的机密性和不可伪造性。本文定义了从无证书公钥密码环境到传统公钥密码环境(CLPKC→TPKI)异构签密方案的形式化模型,并利用双线性对提出了一个CLPKC→TPKI异构签密方案。在随机预言模型下,基于计算Diffie-Hellman和修改逆计算Diffie-Hellman困难假设,证明方案满足内部安全的机密性和不可伪造性。同时,方案满足密文匿名性,可以有效地保护收发双方的身份隐私。方案使用不同的密码系统参数,更接近于实际应用环境。与已有异构签密方案相比,方案的效率较高,适合于收发双方身份保密和带宽受限的应用需求。

关 键 词:异构签密  无证书公钥密码  密文匿名  计算Diffie-Hellman困难问题  修改逆计算Diffie-Hellman困难问题
收稿时间:2015-06-17

CLPKC-to-TPKI Heterogeneous Signcryption Scheme with Anonymity
ZHANG Yu-lei,ZHANG Ling-gang,ZHANG Yong-jie,WANG Huan,Wang Cai-fen.CLPKC-to-TPKI Heterogeneous Signcryption Scheme with Anonymity[J].Acta Electronica Sinica,2016,44(10):2432-2439.
Authors:ZHANG Yu-lei  ZHANG Ling-gang  ZHANG Yong-jie  WANG Huan  Wang Cai-fen
Abstract:Heterogeneous signcryption,a cryptographic primitive,can simultaneously provide the confidentiality and unforgeability of data transmission between different public key cryptography.The paper gives the definition and security models of CLPKC-to-TPKI heterogeneous signcryption scheme between CLPKC (Certificateless Public Key Cryptography) and TPKI (Traditional Public Key Infrastructure),and presents a construction by using the bilinear pairing.In the random oracle model,based on the assumptions of Computational Diffie-Hellman and modifying Inverse Computational Diffie-Hell-man,the scheme is proved to satisfy the confidentiality and unforgeability of the insider security.Moreover,it satisfies the properties of ciphertext anonymity which can efficiently protect the privacies of sender and receiver.Owing to the independ-ence and difference of the system parameters in CLPKC and TPKI,the scheme is more suitable in the practical environ-ments.Furthermore,the analysis of efficiency shows that,comparing to the existing heterogeneous signcryption schemes,the scheme is more efficient,so it is suitable for the requirements of identity hiding and constrained bandwidth.
Keywords:heterogeneous signcryption  certificateless public key cryptography  ciphertext anonymity  computational Diffie-Hellman problem (CDH)  modification inverse computational Diffie-Hellman problem(mICDH)
本文献已被 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号