首页 | 本学科首页   官方微博 | 高级检索  
     

基于身份的跨信任域签密方案
引用本文:张 雪,冀会芳,李光松,韩文报. 基于身份的跨信任域签密方案[J]. 计算机科学, 2015, 42(5): 165-168
作者姓名:张 雪  冀会芳  李光松  韩文报
作者单位:信息工程大学数学工程与先进计算国家重点实验室 郑州450002
基金项目:本文受国家自然科学基金资助
摘    要:实际网络环境尤其是未来异构网络融合环境中,各个信任域大多都是独立的自治域,使用不同的系统参数.为此提出了一种新的基于身份的跨信任域签密方案,该方案对PKG系统参数不作限制,各PKG可以使用完全不同的系统公开参数、不同的主密钥和公钥.并且在该签密协议的基础上给出了会话密钥的生成方法.在随机预言模型中给出了安全性证明,在BDH问题是困难的的假设下该协议是安全的,其满足机密性、不可伪造性、不可否认性和公开验证性.在与其他跨信任域签密方案计算开销相当的情况下,该方案不仅实现了跨信任域签密,而且对各PKG参数不作限制.

关 键 词:基于身份  签密  跨信任域  密钥协商

Identity-based Signcryption Cross Autonomous Domains
ZHANG Xue,JI Hui-fang,LI Guang-song and HAN Wen-bao. Identity-based Signcryption Cross Autonomous Domains[J]. Computer Science, 2015, 42(5): 165-168
Authors:ZHANG Xue  JI Hui-fang  LI Guang-song  HAN Wen-bao
Affiliation:State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Information Engineering University,Zhengzhou 450002,China,State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Information Engineering University,Zhengzhou 450002,China,State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Information Engineering University,Zhengzhou 450002,China and State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Information Engineering University,Zhengzhou 450002,China
Abstract:Real networks especially heterogeneous networks consist of several cooperating sub-networks which belong to different trust domains which are independent and autonomous.The trust domains are maintained by different PKGs.A novel ID-based cross-domain signcryption scheme was proposed which is no restriction on PKG system parameters so that public system parameters,system master keys and system public keys can be totally different.Based upon this signcryption scheme,a cross-domain session key generation scheme was presented.Our cross-doamin signcryption protocol was proved to be secure in the random oracle model assuming the bilinear Diffle-Hellman problem is hard.It satisfies the basic security requirements confidentiality,unforgeability,non-repudiation and public verifiability.The scheme not only achieves cross-domain signcryption,but also makes no restriction on PKG system parameters on condition that computation overheads are little increased.
Keywords:Identity-based  Signcryption  Cross-domain  Key agreement
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号