排序方式: 共有150条查询结果,搜索用时 23 毫秒
101.
《Journal of Computer and System Sciences》2016,82(5):756-757
Zheng, Xiang and Zhou published in Journal of Computer and System Sciences in 2015 a “strong provably secure IBE scheme without bilinear map”. In this note, we provide two very simple attacks on their scheme. 相似文献
102.
针对若干强指定验证者签名方案所存在的安全问题,给出了对一类新的高效的基于身份的强指定验证者签名方案的分析,指出该方案不具备强指定验证者签名应有的特性,并针对该方案所存在的缺陷给出了一种伪造攻击,利用该攻击任何第三方即使没有签名者或验证者的私钥也可以生成有效的签名.最后提出了一种新的基于身份的强指定验证者签名方案,并在随机预言机模型中基于双线性Diffie-Hellman假设给出了其形式化的安全性证明,该方案与已有方案相比具有更高的效率,且满足强指定验证者签名的所有性质. 相似文献
103.
NEW ID-BASED GROUP SIGNATURE FROM PAIRINGS 总被引:3,自引:0,他引:3
Chen Xiaofeng Zhang Fangguo Kwangjo Kim 《电子科学学刊(英文版)》2006,23(6):892-900
We argue that traditional identity-based systems from pairings seem unsuitable for designing group signature schemes due to the problem of key escrow. In this paper we first propose new ID-based public key systems without trusted PKG (Private Key Generator) from bilinear pairings, In our new ID-based systems, if the dishonest PKG impersonates an honest user to communicate with others, the user can provide a proof of treachery of the PKG afterwards, which is similar to certificate-based systems. Therefore, our systems reach the Girault's trusted level 3. We then propose a group signature scheme under the new ID-based systems, the security and performance of which rely on the new systems. The size of the group public key and the length of the signature are independent on the numbers of the group. 相似文献
104.
105.
In 1984, Shamir proposed the concept of the Identity-Based (ID-Based) cryptosystem. Instead of generating and publishing a public key for each user, the ID-Based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct. In such a way, a large public-key file is not required. Since new cryptographic schemes always face security challenges and many discrete logarithm-based cryptographic systems have been deployed, therefore, the purpose of this paper is to design a transformation process that can transfer all of the discrete logarithm based cryptosystems into the ID-based systems rather than re-invent a new system. In addition, no modification of the original discrete logarithm based cryptosystems is necessary. 相似文献
106.
Fagen LiAuthor Vitae Muhammad Khurram KhanAuthor Vitae 《Future Generation Computer Systems》2012,28(1):306-310
Signcryption is a high performance cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we introduce biometrics into identity-based signcryption. We formalize the notion of biometric identity-based signcryption and propose an efficient biometric identity-based signcryption scheme that uses biometric information to construct the public key. We prove that our scheme satisfies confidentiality and unforgeability in the random oracle model. We show that both the computational costs and the communication overheads of our scheme are lower than those of the signature-then-encryption approach. 相似文献
107.
云存储技术发展非常迅速,用户能高效地共享数据、便捷地处理数据,但是不能保证不会外泄用户的敏感信息。带关键字搜索的公钥加密(PEKS)方案能在不解密的情况下对关键字进行搜索,但PEKS存在管理证书的问题。它的变体,即基于身份的可搜索加密方案(IBEKS)能简化公钥基础设施中证书的管理,然而,大多数的方案都不能抵抗内部敌手的关键字猜测攻击。因此提出一个安全的指定发送者的基于身份的可搜索加密,能同时满足陷门不可区分性和密文不可区分性。与已有方案相比,该方案的存储和计算的代价较低,保证了使用性和效率。 相似文献
108.
YANG Zhichao DUNG H.Duong WILLY Susilo YANG Guomin LI Chao CHEN Rongmao 《电子学报:英文版》2021,30(2):238-248
Digital signature is one of the most important cryptography primitives. Recently, more and more works have been done to construct signatures over lattice problems to keep them secure in the quantum age. Among them, a ring-based signature scheme named Dilithium is the most efficient one and a candidate in the third round of the National Institute of Standards and Technology's post-quantum cryptography project. To make those schemes work well in large network, we constructed the first ring-based Identity-based signature (IBS) scheme for light-weight authentication. The construction in this paper relies on the transformations introduced by Bellare et al. in Journal of Cryptology (Vol.22, No.1, pp.1–61, 2009) and its security can be proved under the hardness of ring-learning with errors problem in the random oracle model. Due to better trapdoor and polynomial ring setting, our proposed scheme are much better than the previous ones in terms of both computation and communication complexities. 相似文献
109.
110.
Zuhua Shao 《Information Processing Letters》2003,86(6):295-298
In this paper, we show that the identity-based society oriented signature scheme with anonymous signers proposed by Saeednia is insecure. If some members of a given group leave that group or if some new members join the group, their secret keys would be revealed. We also propose a simple way to fulfill the task of the identity-based society oriented signature scheme with anonymous signers. 相似文献