[1]黄海,祁正华,杨红尘. 标准模型下基于身份的高效多签密方案[J].计算机技术与发展,2016,26(12):122-126.
 HUANG Hai,QI Zheng-hua,YANG Hong-chen. An Efficient Identity-based Multi-signcryption in Standard Model[J].,2016,26(12):122-126.
点击复制

 标准模型下基于身份的高效多签密方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年12期
页码:
122-126
栏目:
安全与防范
出版日期:
2016-12-10

文章信息/Info

Title:
 An Efficient Identity-based Multi-signcryption in Standard Model
文章编号:
1673-629X(2016)12-0122-05
作者:
 黄海祁正华杨红尘
 南京邮电大学 计算机学院
Author(s):
 HUANG HaiQI Zheng-huaYANG Hong-chen
关键词:
 基于身份多签密标准模型双线性对
Keywords:
 identity-basedmulti-signcrytionstandard modelbilinear pairing
分类号:
TP301
文献标志码:
A
摘要:
 签密能够同时实现加密和认证功能,并且其计算代价小于传统的将两者组合使用的方式。所以用标准模型来构建高效安全的基于身份的签密方案是当下密码学领域的热点问题之一。该方案利用椭圆曲线上的双线性对,构建了将标准模型下基于身份的加密算法同多接收者情况下的签名算法两者优点相结合的基于身份的多接收者签密方案构架和安全概念,形成了具有安全、高效性的多接收者签密方案。针对现有基于身份的多签密方案存在效率不高的问题,提出了一种高效的基于身份的多签密方案。新方案在参与签密者人数为n(n >1)时减少了大量的幂运算,并在标准模型下进行了安全性分析及效率分析,证明了新方案可归约于CDH困难假定以及计算量的减少。与原有方案相比,在保证安全性的同时,多签密效率有了大幅提高。
Abstract:
 Signcryption can achieve encryption and signature at the same time,and less computational complexity than the traditional se-cure schemes that fulfill the functions both. Therefore it becomes one of the hottest topics in today’ s cryptography to construct a secure and efficient Identity-Based Signature ( IBS) under standard model. In the IBS,identity-based encryption algorithm and multi-receiver signature algorithm are combined with bilinear pairing on elliptic curves to establish the structure and security concept of ID-based sign-cryption scheme for multiple receivers,forming an efficient identity-based multi signcryption. In view of the low efficiency of existing i-dentity-based multi-signcryption,an efficient identity-based multi-signcryption algorithm is proposed,and it reduces the amount of power operation when the number of the signcrypter is n(n > 1) and gives the security and efficiency analysis in the standard model. It has proved that the new scheme’ s secure under CDH assumption and reduces the calculation. Compared with the original scheme,the signcryption efficiency has been significantly improved.

相似文献/References:

[1]李沛 王天芹.基于身份的代理签名方案[J].计算机技术与发展,2011,(05):155.
 LI Pei,WANG Tian-qin.ID-Based Proxy Signature Scheme from Bilinear Pairings[J].,2011,(12):155.
[2]王昱菲 杨庚 陈哲 姚卓禹.一种基于身份的在线/离线加密方案[J].计算机技术与发展,2012,(04):223.
 WANG Yu-fei,YANG Geng,CHEN Zhe,et al.Identity-Based Online/Offline Encryption[J].,2012,(12):223.
[3]周星,刘军,董春冻,等.基于身份的卫星网络密钥管理方案[J].计算机技术与发展,2013,(11):148.
 ZHOU Xing[],LIU Jun[],DONG Chun-dong[],et al.A Scheme of Identity-based Satellite Network Key Management[J].,2013,(12):148.
[4]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(12):1.
[5]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(12):5.
[6]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(12):13.
[7]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(12):21.
[8]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(12):25.
[9]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(12):29.
[10]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(12):34.

更新日期/Last Update: 2017-02-03