共查询到17条相似文献,搜索用时 75 毫秒
1.
本文利用椭圆曲线上的双线性对提出一个新的基于身份的多重签密方案,解决以前的传统证书式多重签密方案的证书管理,传递等繁琐问题.并进行了安全性分析,在BDH问题是困难的假设下方案是安全的.签密能够在一个逻辑步骤内同时完成保密和认证两项功能,而其计算量和通信成本都要低于传统的“先签名后加密”,在电子商务等方向有很好的应用前景。 相似文献
2.
在基于身份的签密方案,公钥可以通过用户的身份直接得到,简化了证书管理,但在传统的签密方案中,密钥产生中心很容易知道用户的私钥.不适合方案在开放式环境中的应用。文章利用椭圆曲线上双线性映射的特性.提出了一个扩展的基于身份的签密方案,并且对其安全性进行了证明。该方案具有多个密钥产生中心,能够同时实现数字签名和消息加密两项功能,能够应用于开放环境中,实现了向前安全性。 相似文献
3.
利用椭圆曲线上的双线性对,提出一个基于身份的签密方案。在新方案中,接收者收到一个签密消息,在验证该消息签名的合法性后,再对消息进行恢复。在安全性方面,新方案具有机密性、不可伪造性、公开可验证性、鲁棒性;在计算量和通信成本方面,新方案中只需要进行1次模指数运算、2次双线性对运算和1次双线性对预运算,签密产生的密文长度为2|G1|+|m|,总成本比已有的基于身份的签密方案耗费少,从而有效实现了对消息的认证和保密。 相似文献
4.
5.
6.
7.
签密能够在一个合理的密码协议中同时完成数字签名和公钥加密两种功能,减少了通信成本.利用椭圆曲线的双线性对性质,提出了一种基于身份的签密方案.该方案同时满足签密方案所具有的机密性、不可伪造性、前向安全性,而且能抵抗信息接收方的欺骗攻击.通过分析和比较,该方案具有很好的安全性和较高的效率. 相似文献
8.
签密能高效地同时完成数据加密与认证,可用于设计紧凑的安全通信协议.签密中的仲裁机制用于保护签密的不可抵赖性,但同时用于仲裁的信息可能危及协议安全.本文指出签密仲裁中存在仲裁者解密攻击和仲裁机制无法保护明文完整性两种安全隐患,归纳其原因并指出解决方法.提出一个可安全仲裁的安全混合签密方案SASC,并在随机预言机模型下证明SASC方案具有IND-CCA2和UF-CMA安全性;SASC基于明文仲裁,不仅能维护明完整性而且能抵抗仲裁者解密攻击.SASC方案不增加计算量和通信量,且对明文的长度没有限制. 相似文献
9.
10.
11.
为了解决传统公钥密码体制中的证书管理问题和身份基公钥密码体制中的密钥托管问题,Al-Riyami和Paterson提出了无证书公钥密码体制。最近朱辉等提出了一个不含双线性对运算的无证书签密机制。然而,通过对其进行分析,发现该机制是不安全的(即不能提供保密性和不可伪造性),并给出了具体的攻击方法。为了增强安全性,提出了一个更安全的无证书签密机制,并在随机预言模型下基于离散对数问题和计算性Diffie-Hellman问题给出了安全性证明。此外,新机制具有良好的性能,签密算法只需要4个模幂运算,解密验证算法只需要5个模幂运算。 相似文献
12.
13.
14.
15.
Efficient identity-based fully homomorphic encryption over NTRU 总被引:1,自引:0,他引:1
Fully homomorphic encryption is the best solution for solving privacy concerns for data over cloud so far,while large public key size is a general shortcoming for existing schemes.First,by introducing the concept of Kullback-Leibler divergence,an identity-based public key scheme over NTRU lattice with modified ciphertext form was proposed.Analysis on parameter setting showed its small key size and ciphertext size,and experiments revealed its high computational efficiency.Second,with the idea of approximate eigenvector,an improved method to convert the scheme into an identity-based fully homomorphic encryption one was put forward to further reduce ciphertext size.Compared with existing schemes,the converted scheme not only abandons evaluation keys to make it fully identity-based,but also has smaller keys and ciphertext,which results in higher computational and transmission efficiency. 相似文献
16.
In practical applications,the potential adversary may exploit partial information about the secret keys by side-channel attacks ,traditional certificateless signcryption schemes can’t resist these key-leakage attacks.A leakage-resilient certificateless signcryption scheme based on Elliptic Curve Cryptography and bilinear pairing was presented.In the random oracle,proved that the security of the scheme is based on the decisional Diffie-Hellman assumption.The scheme is also proved semantically secure against adaptive posterior chosen-ciphertext key-leakage attacks (KL-CCA2),and existentially unforgeable against chosen-message key-leakage attacks(KL-CMA).The proposed scheme was free from non-interactive zero knowledge proof system and needs no bilinear paring operation in signcryption phase.Compared with other schemes of the same kind,the proposed scheme can resist key-leakage attacks and maintains high efficiency. 相似文献
17.
The research on the identification scheme is an important and active area in computer and communication security. A series of identification schemes were proposed to improve the efficiency and security of the protocols by various methods. Based on the hardness assumption of the discrete logarithm problem in a gap Diffie-Hellman group and the difficulty of the collusion attack algorithm with k traitors, an efficient identification scheme is presented. Without random oracle models, the proposed scheme is then proved secure against impersonation and reset attacks in both concurrent and reset attack setting. Since the proposed scheme is simple, memory-saving, computation-efficient, and perfectly-secure, it is well suitable for use in smart cards. 相似文献