《山东大学学报(理学版)》 ›› 2020, Vol. 55 ›› Issue (3): 51-57.doi: 10.6040/j.issn.1671-9352.2.2019.177
• • 上一篇
岳泽轮,王栋,毛江龙
摘要: 签密可以在一个逻辑步骤内实现加密和签名2个功能,与传统的先加密后签名或先签名后加密相比,节省了计算量。与使用双线性对的密码方案相比,不使用双线性对的密码方案在计算效率上有着很大的提升。提出了一种改进的不使用双线性对的无证书签密方案,在随机预言模型下对方案的安全性进行了证明,并对方案进行了实验分析。
中图分类号:
[1] ZHENG Yuliang. Digital signcryption or how to achieve cost(signature & encryption)≪cost(signature)+cost(encryption)[C] // Proc of the 17th Annual International Cryptology Conference. California: Springer-Verlag, 1997: 165-179. [2] SHAMIR A. Identity-based cryptosystems and signature schemes[C] // Workshop on the Theory and Application of Cryptographic Techniques. Berlin: Springer, 1984: 47-53. [3] Al-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C] // International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2003: 452-473. [4] 张福泰, 孙银霞, 张磊,等. 无证书公钥密码体制研究[J]. 软件学报, 2011, 22(6):1316-1332. ZHANG Futai, SUN Yinxia, ZHANG Lei, et al. Research on certificateless public key cryptography[J]. Journal of Software, 2011, 22(6):1316-1332. [5] 侯红霞,张雪锋,董晓丽. 改进的无证书聚合签名方案[J]. 山东大学学报(理学版), 2013, 48(9):29-34. HOU Hongxia, ZHANG Xuefeng, DONG Xiaoli. Improved certificateless aggregate signature scheme[J]. Journal of Shandong University(Natural Science), 2013, 48(9):29-34. [6] 杨珺涵, 曹天杰. 标准模型下基于无证书密钥封装的口令认证密钥交换协议[J]. 山东大学学报(工学版), 2013, 43(2):11-17. YANG Junhan, CAO Tianjie. Password-authenticated key exchange protocol based on certificateless key encapsulation in the standard model[J]. Journal of Shandong University(Engineering Science), 2013, 43(2):11-17. [7] 杜瑞颖, 刘亚斌, 刘建东, 等. 无证书密钥隔离签名方案[J]. 山东大学学报(理学版), 2014, 49(9):24-28. DU Ruiying, LIU Yabin, LIU Jiandong, et al. A certificateless key-insulated signature scheme[J]. Journal of Shandong University(Natural Science), 2014, 49(9):24-28. [8] 樊爱宛, 夏栋梁, 杨照峰. 两种无证书聚合签名方案的安全性分析及改进[J]. 山东大学学报(理学版), 2015, 50(9):42-48. FAN Aiwan, XIA Dongliang, YANG Zhaofeng. Security analysis and improvement of two certificateless aggregate signature schemes[J]. Journal of Shandong University(Natural Science), 2015, 50(9):42-48. [9] BARBOSA M, FARSHIM P. Certificateless signcryption[C] // Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2008: 369-372. [10] WU Chenhuang, CHEN Zhixiong. A new efficient certificateless signcryption scheme[C] // Proceedings of the Information Science and Engineering, International Symposium on IEEE, New York: IEEE, 2008: 661-664. [11] LI F G, SHIRASE M, TAKAGI T. Certificateless hybrid signcryption[M] // Information Security Practice and Experience. Berlin: Springer, 2009: 112-123. [12] BARRETO P S L M, DEUSAJUTE A M, DE E, et al. Toward efficient certificateless signcryption from(and without)bilinear pairings[C] // VIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais. New York: IEEE, 2008. [13] 朱辉, 李晖, 王育民. 不使用双线性对的无证书签密方案[J]. 计算机研究与发展, 2010, 47(9):1587-1594. ZHU Hui, LI Hui, WANG Yunming. Certificateless signcryption scheme without pairing[J]. Journal of Computer Research and Development, 2010, 47(9):1587-1594. [14] SELVI S S D, VIVEK S S, RANGAN C P. Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing[M] // Information Security and Cryptology. Berlin: Springer, 2010: 75-92. [15] SHI W B, KUMAR N, GONG P, et al. Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing[J]. Frontiers of Computer Science, 2014, 8(4):656-666. [16] 赵振国. 无证书签密机制的安全性分析与改进[J]. 通信学报, 2015, 36(3):125-130. ZHAO Zhenguo. Security analysis and improvement of a certificateless signcryption scheme[J]. Journal on Communications, 2015, 36(3):125-130. [17] 周彦伟, 杨波, 张文政. 不使用双线性映射的无证书签密方案的安全性分析及改进[J]. 计算机学报, 2016, 39(6):1257-1266. ZHOU Yanwei, YANG Bo, ZHANG Wenzheng. Security analysis and improvement of certificateless signcryption scheme without bilinear pairing[J]. Chinese Journal of Computers, 2016, 39(6):1257-1266. |
[1] | 樊爱宛, 夏栋梁, 杨照峰. 两种无证书聚合签名方案的安全性分析及改进[J]. 山东大学学报(理学版), 2015, 50(09): 42-48. |
[2] | 阎召祥. ZS加密方案的选密安全性证明[J]. J4, 2010, 45(11): 115-121. |
|