浏览全部资源
扫码关注微信
1. 济南大学 信息科学与工程学院,山东 济南 250022
2. 山东省网络环境智能计算技术重点实验室,山东 济南 250022
3. 山东省软件工程重点实验室,山东 济南 250101
[ "张波(1981-),男,山东德州人,济南大学讲师,主要研究方向为密码学与信息安全。" ]
[ "孙涛(1974-),男,山东淄博人,济南大学副教授,主要研究方向为可信计算理论研究与实践。" ]
[ "于代荣(1972-),男,山东济南人,济南大学副教授,主要研究方向为网络安全协议设计与分析。" ]
网络出版日期:2015-09,
纸质出版日期:2015-09-25
移动端阅览
张波, 孙涛, 于代荣. 基于身份的多接收者匿名签密改进方案[J]. 通信学报, 2015,36(9):109-118.
Bo ZHANG, Tao SUN, Dai-rong YU. Improved identity based multi-receiver anonymous signcryption scheme[J]. Journal on communications, 2015, 36(9): 109-118.
张波, 孙涛, 于代荣. 基于身份的多接收者匿名签密改进方案[J]. 通信学报, 2015,36(9):109-118. DOI: 10.11959/j.issn.1000-436x.2015187.
Bo ZHANG, Tao SUN, Dai-rong YU. Improved identity based multi-receiver anonymous signcryption scheme[J]. Journal on communications, 2015, 36(9): 109-118. DOI: 10.11959/j.issn.1000-436x.2015187.
对庞等提出的首个考虑发送者和接收者双重匿名性的基于身份的多接收者匿名签密方案进行安全性分析,结果表明该方案不满足选择密文攻击下的密文不可区分性,在现有安全模型下,攻击者可以区分不同消息的签密密文。提出一个在随机预言模型下选定身份安全的改进方案,新方案在CDH和Gap-BDH困难问题假设下分别满足密文的存在不可伪造性和不可区分性。
Recently
Pang
et al proposed a novel identity based multi-receiver anonymous signcryption scheme (IBMRASC)
which put into consideration both the sender's anonymity and the receiver's anonymity simultaneously.However
the analysis with respect to this scheme indicated that
under existing security models the adversary can distin-guish the ciphertexts associated with different plaintexts.Therefore
Pang's approach did not satisfy the requirement of indistinguishability against chosen ciphertext attacks (CCA).An improved scheme which is selective identity secure in the random oracle model was proposed.Under the CDH and Gap-BDH hard problem assumption
the improved scheme is both existentially unforgetable against chosen message attack and indistinguishable against adaptive CCA.
ZHENG Y . Digital signcryption or how to achieve cost (signature &encryption) << cost (signature) + cost (encryption) [A ] . Proc of the 17th Annual International Cryptology Conference on Advances in Cryptology [C ] . London,UK , 1997 . 165 - 179 .
SHAMIR A . Identity-based cryptosystem and signature scheme [A ] . Proc of CRYPTO 1984 [C ] . Santa Barbara,California,USA , 1985 . 120 - 126 .
HUANG X , SUSILO W , MU Y , et al . Identity-based ring signcryption schemes:cryptographic primitives for preserving privacy and authen-ticity in the ubiquitous world [A ] . Proc of the 19th International Con-ference on Advanced Information Networking and Applications [C ] . Taipei,China , 2005 . 649 - 654 .
YU Y , LI F , XU C , et al . An efficient identity-based anonymous signcryption scheme [J ] . Wuhan University Journal of Natural Sciences , 2008 , 13 ( 6 ): 670 - 674 .
LI F , XIONG H , YU Y . An efficient id-based ring signcryption scheme [A ] . Proc of 2008 International Conference on Communica-tions,Circuits and Systems [C ] . Shanghai,China , 2008 . 483 - 487 .
ZHU Z , ZHANG Y , WANG F . An efficient and provable secure identity based ring signcryption scheme [J ] . Computer Standard and Interface , 2008 , 31 ( 6 ): 1092 - 1097 .
LI F , SHIRASE M , TAKAI T . Analysis and improvement of authen-ticatable ring signcryption scheme [J ] . Journal of Shanghai Jiaotong University (Science) , 2008 , 13 ( 6 ): 679 - 683 .
ZHANG J , GAO S , CHEN H , et al . A novel id-based anonymous signcryption scheme [A ] . Proc of the Advances in Data and Web Management Joint International Conference [C ] . Suzhou,China , 2009 . 604 - 610 .
ZHANG M , ZHONG Y , YANG B , et al . Analysis and improvement of an id-based anonymous signcryption model [A ] . Proc of 5th Interna-tional Conference on Intelligent Computing [C ] . Ulsan,South Korea , 2009 . 433 - 442 .
SELVI S , VIVEK S , RANGAN C . Identity based ring signcryption schemes revisited [J ] . Journal of Math-for Industry , 2011 , 3 : 33 - 46 .
GAURAV S , SUMAN B , ANIL K . An identity-based ring signcryption scheme [A ] . IT Convergence and Security 2012,Lecture Notes in Electrical Engineering 215 [C ] . 2012 . 151 - 157 .
DUAN S , CAO Z . Efficient and provably secure multi-receiver identity-based signcryption [A ] . Proc of the Information Security and Privacy 11th Australasian Conference [C ] . Melbourne,Australia , 2006 . 195 - 206 .
YU Y , YANG B , HUANG X , et al . Efficient identity-based signcryp-tion scheme for multiple receivers [A ] . Proc of 4th International Con-ference on Autonomic and Trusted Computing [C ] . Hong Kong,China , 2007 . 13 - 21 .
LAL S , KUSHWAH P . Anonymous ID based signcryption scheme for multiple receivers [EB/OL ] . http://eprint.iacr.org/2009/345 http://eprint.iacr.org/2009/345 . 2009 .
ZHANG B , XU Q . An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model [A ] . Proc of the 4th In-ternational Conference on Information Security and Assurance [C ] . Miyazaki,Japan , 2010 . 15 - 27 .
庞辽军 , 崔静静 , 李慧贤 , 等 . 新的基于身份的多接收者匿名签密方案 [J ] . 计算机学报 , 2011 , 34 ( 11 ): 2104 - 2113 .
PANG L J , CUI J J , LI H X , et al . A new multi-receiver ID-based anonymous signcryptionc [J ] . Chinese Journal of Computers , 2011 , 34 ( 11 ): 2104 - 2113 .
李慧贤 , 陈绪宝 , 巨龙飞 , 等 . 改进的多接收者签密方案 [J ] . 计算机研究与发展 , 2013 , 50 ( 7 ): 1418 - 1425 .
LI H X , CHEN X B , JU L F , et al . Improved multi-receiver signcryp-tion scheme [J ] . Journal of Computer Research and Development , 2013 , 50 ( 7 ): 1418 - 1425 .
庞辽军 , 高璐 , 裴庆祺 , 等 . 基于身份公平的匿名多接收者签密方案 [J ] . 通信学报 , 2013 , 34 ( 8 ): 161 - 168 .
PANG L J , GAO L , PEI Q Q , et al . Fair and anonymous ID-based multi-receiver signcryption [J ] . Journal on Communications , 2013 , 34 ( 8 ): 161 - 168 .
PANG L , LI H , GAO L , et al . Completely anonymous multi-recipient signcryption scheme with public verification [J ] . PLoS ONE , 2013 , 8 ( 5 ): 63562 .
CHOW S , YIU S , HUI L . Efficient identity based ring signature [A ] . Proc of ACNS 2005 [C ] . New York,USA , 2005 . 499 - 512 .
TSENG Y , HUANG Y , CHANG H . Privacy-preserving multireceiver id-based encryption with provable security [J ] . International Journal of Communication Systems of Communication Systems , 2014 , 27 ( 7 ): 1034 - 1050 .
DAVID P , JACQUES S . Security arguments for digital signatures and blind signatures [J ] . Journal of Cryptology:The Journal of the Interna-tional Association for Cryptologic Research , 2000 , 13 ( 3 ): 361 - 396 .
0
浏览量
673
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构