您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

《山东大学学报(理学版)》 ›› 2020, Vol. 55 ›› Issue (3): 51-57.doi: 10.6040/j.issn.1671-9352.2.2019.177

• • 上一篇    

改进的不使用双线性对无证书签密方案

岳泽轮,王栋,毛江龙   

  1. 武警后勤学院保密档案与文化影视系, 天津 300300
  • 发布日期:2020-03-27
  • 作者简介:岳泽轮(1989— ),男,硕士,助教,研究方向为密码学与网络安全. E-mail:yuezelun@163.com
  • 基金资助:
    武警后勤学院校立课题(WHY201906)

  1. Department of Secrecy, Archive and Screen, Logistics University of Peoples Armed Police Force, Tianjin 300300, China
  • Published:2020-03-27

摘要: 签密可以在一个逻辑步骤内实现加密和签名2个功能,与传统的先加密后签名或先签名后加密相比,节省了计算量。与使用双线性对的密码方案相比,不使用双线性对的密码方案在计算效率上有着很大的提升。提出了一种改进的不使用双线性对的无证书签密方案,在随机预言模型下对方案的安全性进行了证明,并对方案进行了实验分析。

关键词: 无证书签密, 随机预言模型, 无双线性对

Abstract: Signcryption can finish encryption and signature in one logical step. Compared with traditional encryption scheme, signcryption is more efficient. Compared with the cryptographic schemes using bilinear pairings, the cryptographic schemes without bilinear pairings have a great improvement in computational efficiency. An improved certificateless signcryption scheme without bilinear pairings is proposed. The security of the scheme is proved under the random oracle model, and the scheme is analyzed by experiments.

Key words: certificateless signcryption, random oracle model, without bilinear pairing

中图分类号: 

  • TP309
[1] ZHENG Yuliang. Digital signcryption or how to achieve cost(signature & encryption)≪cost(signature)+cost(encryption)[C] // Proc of the 17th Annual International Cryptology Conference. California: Springer-Verlag, 1997: 165-179.
[2] SHAMIR A. Identity-based cryptosystems and signature schemes[C] // Workshop on the Theory and Application of Cryptographic Techniques. Berlin: Springer, 1984: 47-53.
[3] Al-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C] // International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2003: 452-473.
[4] 张福泰, 孙银霞, 张磊,等. 无证书公钥密码体制研究[J]. 软件学报, 2011, 22(6):1316-1332. ZHANG Futai, SUN Yinxia, ZHANG Lei, et al. Research on certificateless public key cryptography[J]. Journal of Software, 2011, 22(6):1316-1332.
[5] 侯红霞,张雪锋,董晓丽. 改进的无证书聚合签名方案[J]. 山东大学学报(理学版), 2013, 48(9):29-34. HOU Hongxia, ZHANG Xuefeng, DONG Xiaoli. Improved certificateless aggregate signature scheme[J]. Journal of Shandong University(Natural Science), 2013, 48(9):29-34.
[6] 杨珺涵, 曹天杰. 标准模型下基于无证书密钥封装的口令认证密钥交换协议[J]. 山东大学学报(工学版), 2013, 43(2):11-17. YANG Junhan, CAO Tianjie. Password-authenticated key exchange protocol based on certificateless key encapsulation in the standard model[J]. Journal of Shandong University(Engineering Science), 2013, 43(2):11-17.
[7] 杜瑞颖, 刘亚斌, 刘建东, 等. 无证书密钥隔离签名方案[J]. 山东大学学报(理学版), 2014, 49(9):24-28. DU Ruiying, LIU Yabin, LIU Jiandong, et al. A certificateless key-insulated signature scheme[J]. Journal of Shandong University(Natural Science), 2014, 49(9):24-28.
[8] 樊爱宛, 夏栋梁, 杨照峰. 两种无证书聚合签名方案的安全性分析及改进[J]. 山东大学学报(理学版), 2015, 50(9):42-48. FAN Aiwan, XIA Dongliang, YANG Zhaofeng. Security analysis and improvement of two certificateless aggregate signature schemes[J]. Journal of Shandong University(Natural Science), 2015, 50(9):42-48.
[9] BARBOSA M, FARSHIM P. Certificateless signcryption[C] // Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2008: 369-372.
[10] WU Chenhuang, CHEN Zhixiong. A new efficient certificateless signcryption scheme[C] // Proceedings of the Information Science and Engineering, International Symposium on IEEE, New York: IEEE, 2008: 661-664.
[11] LI F G, SHIRASE M, TAKAGI T. Certificateless hybrid signcryption[M] // Information Security Practice and Experience. Berlin: Springer, 2009: 112-123.
[12] BARRETO P S L M, DEUSAJUTE A M, DE E, et al. Toward efficient certificateless signcryption from(and without)bilinear pairings[C] // VIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais. New York: IEEE, 2008.
[13] 朱辉, 李晖, 王育民. 不使用双线性对的无证书签密方案[J]. 计算机研究与发展, 2010, 47(9):1587-1594. ZHU Hui, LI Hui, WANG Yunming. Certificateless signcryption scheme without pairing[J]. Journal of Computer Research and Development, 2010, 47(9):1587-1594.
[14] SELVI S S D, VIVEK S S, RANGAN C P. Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing[M] // Information Security and Cryptology. Berlin: Springer, 2010: 75-92.
[15] SHI W B, KUMAR N, GONG P, et al. Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing[J]. Frontiers of Computer Science, 2014, 8(4):656-666.
[16] 赵振国. 无证书签密机制的安全性分析与改进[J]. 通信学报, 2015, 36(3):125-130. ZHAO Zhenguo. Security analysis and improvement of a certificateless signcryption scheme[J]. Journal on Communications, 2015, 36(3):125-130.
[17] 周彦伟, 杨波, 张文政. 不使用双线性映射的无证书签密方案的安全性分析及改进[J]. 计算机学报, 2016, 39(6):1257-1266. ZHOU Yanwei, YANG Bo, ZHANG Wenzheng. Security analysis and improvement of certificateless signcryption scheme without bilinear pairing[J]. Chinese Journal of Computers, 2016, 39(6):1257-1266.
[1] 樊爱宛, 夏栋梁, 杨照峰. 两种无证书聚合签名方案的安全性分析及改进[J]. 山东大学学报(理学版), 2015, 50(09): 42-48.
[2] 阎召祥. ZS加密方案的选密安全性证明[J]. J4, 2010, 45(11): 115-121.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!