浏览全部资源
扫码关注微信
海军工程大学信息安全系,湖北 武汉 430033
[ "秦艳琳(1980-),女,河南安阳人,博士,海军工程大学讲师,主要研究方向为密码学及网络安全。" ]
[ "吴晓平(1961-),男,山西新绛人,海军工程大学教授、博士生导师,主要研究方向为信息安全及系统工程。" ]
[ "胡卫(1979-),男,湖北宜城人,海军工程大学副教授,主要研究方向为网络及信息安全。" ]
网络出版日期:2017-11,
纸质出版日期:2017-11-25
移动端阅览
秦艳琳, 吴晓平, 胡卫. 抗密钥泄露的无证书签密方案[J]. 通信学报, 2017,38(Z2):43-50.
Yan-lin QIN, Xiao-ping WU, Wei HU. Leakage-resilient certificateless signcryption scheme[J]. Journal on communications, 2017, 38(Z2): 43-50.
秦艳琳, 吴晓平, 胡卫. 抗密钥泄露的无证书签密方案[J]. 通信学报, 2017,38(Z2):43-50. DOI: 10.11959/j.issn.1000-436x.2017267.
Yan-lin QIN, Xiao-ping WU, Wei HU. Leakage-resilient certificateless signcryption scheme[J]. Journal on communications, 2017, 38(Z2): 43-50. DOI: 10.11959/j.issn.1000-436x.2017267.
传统无证书签密方案在实际应用环境中容易遭受边信道攻击,带来密钥泄露问题。为抵制此类攻击,基于椭圆曲线密码体制及双线性对提出一种抗密钥泄露的无证书签密方案,并在随机预言机模型下证明方案的安全性建立在判定 Diffie-Hellman 问题的困难性之上,且能抵制适应性选择密文及密钥泄露攻击,满足选择消息及密钥泄露攻击下的存在不可伪造性。该方案没有使用构造复杂的非交互式零知识证明系统(NIZK),在签密阶段不含双线性对运算,与同类方案相比,能抵制密钥泄露攻击且具有较高的运算效率。
In practical applications
the potential adversary may exploit partial information about the secret keys by side-channel attacks
traditional certificateless signcryption schemes can’t resist these key-leakage attacks.A leakage-resilient certificateless signcryption scheme based on Elliptic Curve Cryptography and bilinear pairing was presented.In the random oracle
proved that the security of the scheme is based on the decisional Diffie-Hellman assumption.The scheme is also proved semantically secure against adaptive posterior chosen-ciphertext key-leakage attacks (KL-CCA2)
and existentially unforgeable against chosen-message key-leakage attacks(KL-CMA).The proposed scheme was free from non-interactive zero knowledge proof system and needs no bilinear paring operation in signcryption phase.Compared with other schemes of the same kind
the proposed scheme can resist key-leakage attacks and maintains high efficiency.
ZHENG Y , . Digital signcryption or how to achieve(signature & encryption) <<cost(signature)+cost(encryption) [C ] // The Crypto’97 , 1997 : 291 - 312 .
SWAPNA G , REDDY V . An efficient id-based public verifiable signcryption scheme [J ] . International Journal of Cryptography and Security , 2013 , 3 ( 1 ): 41 - 46 .
刘振华 , 李娟娟 , 俎龙辉 . 可撤销的基于身份的签密方案 [J ] . 四川大学学报(工程科学版) , 2014 , 46 ( 2 ): 79 - 86 .
LIU Z H , LI J J , ZU L H . Revocable ID-based signcryption scheme [J ] . Journal of Sichuan University(Engineering Science Edition) , 2014 , 46 ( 2 ): 79 - 86 .
ALRIYAMI S , PATERSON K . Certificateless public key cryptography [C ] // ASIACRYPT 2003 , 2003 : 452 - 473 .
刘文浩 , 许春香 . 无双线性配对的无证书签密机制 [J ] . 软件学报 , 2011 , 22 ( 8 ): 1918 - 1926 .
LIU W H , XU C X . Certificateless signcryption scheme without bilinear pairing [J ] . Journal of Software , 2011 , 22 ( 8 ): 1918 - 1926 .
何德彪 . 无证书签密机制的安全性分析 [J ] . 软件学报 , 2013 , 24 ( 3 ): 618 - 622 .
HE D B . Security analysis of a certificateless signcryption scheme [J ] . Journal of Software , 2013 , 24 ( 3 ): 618 - 622 .
孙华 , 孟坤 . 标准模型下可证安全的有效无证书签密方案 [J ] . 计算机应用 , 2013 , 33 ( 7 ): 1846 - 1850 .
SUN H , MENG K . Efficient provably secure certificateless signcryption scheme in standard model [J ] . Journal of Computer Applications , 2013 , 33 ( 7 ): 1846 - 1850 .
马陵勇 , 卓泽朋 , 廉玉忠 . 新的无证书签密方案 [J ] . 吉林师范大学学报(自然科学版) , 2014 , 3 ( 8 ): 93 - 95 .
MA L Y , ZHUO Z P , LIAN Y Z . New Certificateless signcryption scheme [J ] . Jilin Normal University Journal (Natural Science Edition) , 2014 , 3 ( 8 ): 93 - 95 .
汤鹏志 , 张庆兰 , 杨俊芳 . 一种改进的基于双线对的无证书签密方案 [J ] . 合肥工业大学学报(自然科学版) , 2016 , 39 ( 7 ): 917 - 923 .
TANG P Z , ZHANG Q L , YANG J F . An improved certificateless signcryption scheme based on bilinear pairing [J ] . Journal of Hefei University of Technology(Natural Science) , 2016 , 39 ( 7 ): 917 - 923 .
AKAVIA A , GOLDWASSER S , VAIKUNTANATHAN V . Simultaneous hardcore bits and cryptography against memory attacks [C ] // The Theory of Cryptography Conference . 2009 : 474 - 495 .
NAOR M , SEGEV G . Public-key cryptosystems resilient to key leakage [J ] . Society for Industrial and Applied Mathematics , 2012 , 41 ( 4 ): 772 - 814 .
LI S J , ZHANG F T , SUN Y X , et al . Efficient leakage-resilient public key encryption from DDH assumption [J ] . Cluster Comput , 2013 , 16 ( 4 ): 797 - 806 .
HAO X , YUEN T H , ZHANG C , et al . Leakage-resilient certificateless public key encryption [C ] // The First ACM Workshop on Asia Public-key Cryptograph . 2013 : 13 - 22 .
YU Q H , LI J G , ZHANG Y C , et al . Certificate-based encryption resilient to key leakage [J ] . Journal of Systems and Software , 2016 , 116 ( 1 ): 101 - 112
TANG F , LI H . Joint signature and encryption in the presence of continual leakage [C ] // Information Security Applications,LNCS8909 , 2014 : 269 - 280 .
ZHOU Y W , YANG B , ZHANG W Z . Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing [J ] . Discrete Applied Mathematics , 2016 , 204 ( 3 ): 185 - 202 .
FAONIO A , VENTURI D . Efficient public-key cryptography with bounded leakage and tamper resilience [C ] // International Association for Cryptologic Research 2016 . 2016 : 877 - 907 .
秦艳琳 , 吴晓平 . 对一种无证书签密方案的分析与改进 [J ] . 计算机应用研究 , 2015 , 32 ( 11 ): 3426 - 3429 .
QIN Y L , WU X P . Security analysis and improvement of certificateless signcryption scheme [J ] . Application Research of Computers , 2015 , 32 ( 11 ): 3426 - 3429 .
GROTH J , OSTROVSKY R , SAHAI A . Perfect non-interactive zero knowledge for np [C ] // EUROCRYPT 2006 . 2006 : 339 - 358 .
FAONIO A , VENTURI D . Efficient public-key cryptography with bounded leakage and tamper resilience [C ] // International Association for Cryptologic research 2016 . 2016 : 877 - 907 .
0
浏览量
454
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构