[1]王翔,祁正华,黄海. 不使用双线性对的无证书签密方案[J].计算机技术与发展,2017,27(07):106-110.
 WANG Xiang,QI Zheng-hua,HUANG Hai. A Certificateless Signcryption Scheme without Bilinear Pairing[J].,2017,27(07):106-110.
点击复制

 不使用双线性对的无证书签密方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年07期
页码:
106-110
栏目:
安全与防范
出版日期:
2017-07-10

文章信息/Info

Title:
 A Certificateless Signcryption Scheme without Bilinear Pairing
文章编号:
1673-629X(2017)07-0106-05
作者:
 王翔祁正华黄海
 南京邮电大学 计算机学院
Author(s):
 WANG XiangQI Zheng-huaHUANG Hai
关键词:
 无证书签密方案无双线性对随机预言模型信息安全
Keywords:
 no certificate signcryption schemenon bilinear pairingrandom oracle modelinformation security
分类号:
TP309
文献标志码:
A
摘要:
 2003年,Paterson和Al-Riyami率先提出了无证书公钥密码体制.长时间以来因该体制无需进行身份密钥托管并且也不存在传统公钥证书管理困难的问题而备受关注.无证书签密方案中,采用双线性对的方案大多计算繁复,难以实用.为此,近年来提出了多种不采用双线性对的无证书签密方案,以提高方案的性能,但这些方案大多不具有保密性和抗伪造性.针对上述缺陷,文中提出了一种新的不使用双线性对的无证书签密方案.该方案能够抵抗前类方案中广泛存在的内部攻击和密钥线性化攻击.仿真验证结果表明,在随机预言模型下,所提方案具有不可伪造性、正确性和保密性.与已有方案相比,该方案同样有着较高的计算效率,签密过程仅仅进行4次点乘运算,解密校验阶段只需要2次点乘运算.
Abstract:
 The no certificate of public key cryptosystem has been firstly proposed by Paterson and Al-Riyami in 2003,which has been concerned due to disadvantages of unnecessary identity key escrow and no-existing difficulty for traditional certificate management.Inside the no certificate of public key cryptosystem,the computation for the scheme of bilinear pairings is large and complex,unsuitable for practical applications.Therefore,a variety of no certificate signing secret plan without bilinear pairings are proposed to improve the performance in recent years.Unfortunately,these schemes have proved completely insecure in both confidentiality and resistance to forge when facing with the concrete attacks.Thus a new CLS scheme without pairings has been proposed which can resist the public key replacement attack and internal attack better than former schemes.Simulation results show that in the random oracle model the proposed scheme owns unforgeability,correctness and confidentiality and is more efficient than the existing schemes,in which only four point multiplications and two point multiplications are needed in signcryption and unsigncryption separately.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(07):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(07):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(07):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(07):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(07):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(07):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(07):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(07):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(07):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(07):47.

更新日期/Last Update: 2017-08-22