首页 | 本学科首页   官方微博 | 高级检索  
     

可实现隐私保护的多接收者异构聚合签密方案
引用本文:牛淑芬,牛灵,王彩芬,杨喜艳,贾向东. 可实现隐私保护的多接收者异构聚合签密方案[J]. 计算机工程与科学, 2018, 40(5): 805-812
作者姓名:牛淑芬  牛灵  王彩芬  杨喜艳  贾向东
作者单位:(西北师范大学计算机科学与工程学院,甘肃 兰州 730070)
基金项目:国家自然科学基金(61562077,61462077,61662071,61662069);西北师范大学青年教师科研能力提升计划(NWNU-LKQN-14-7);国家留学基金(201708625061)
摘    要:考虑到异构密码系统中的安全通信与隐私保护,提出了一个无证书密码系统到基于身份密码系统的异构签密方案,允许多个发送者与多个接收者进行安全通信并为系统中的发送者实现了匿名,只有信任机构可追踪发送者的真实信息。对于接收者,通过应用拉格朗日插值公式防止了向未授权用户泄露合法接收者的用户信息。在随机预言模型下证明了本方案满足适应性选择密文攻击以及适应性选择消息攻击下的不可区分性和存在性不可伪造。实验结果表明,本方案有效地提高了系统的计算效率。

关 键 词:异构密码系统  聚合签密  无证书密码系统  基于身份的密码系统  
收稿时间:2016-12-08
修稿时间:2018-05-25

Privacy-preserving multi-recipient aggregate signcryptionfor heterogeneous cryptography systems
NIU Shu-fen,NIU Ling,WANG Cai-fen,YANG Xi-yan,JIA Xiang-dong. Privacy-preserving multi-recipient aggregate signcryptionfor heterogeneous cryptography systems[J]. Computer Engineering & Science, 2018, 40(5): 805-812
Authors:NIU Shu-fen  NIU Ling  WANG Cai-fen  YANG Xi-yan  JIA Xiang-dong
Affiliation:(College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China)
Abstract:Taking into account the secure communication and privacy protection in heterogeneous cryptography systems, we propose a heterogeneous aggregate signcryption scheme from certificateless cryptosystems to identity-based cryptography systems, which allows multiple senders to communicate securely with multiple recipients. The scheme makes the senders anonymous in the system, and only trust agencies can track the senders’ real information. For the receivers, the disclosure of the legitimate recipients’ user information to unauthorized users is prevented by applying the Lagrange interpolation formula. In the random oracle model, it is proved that the scheme possesses indistinguishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen-message attacks. Experimental results show that the scheme effectively improves the computational efficiency of the system.
Keywords:heterogeneous cryptography systems  aggregate signcryption  certificateless cryptography  identity-based cryptography  
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号