新的基于身份的(t,n)门限签密方案
作者:

New ID-Based (t,n) Threshold Signcryption Scheme
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [10]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    针对现有的门限签密方案效率低不太实用的不足,以及基于身份的签密系统密钥托管问题,利用双线性对提出了一个新的基于身份的(t,n)门限签密方案。通过引入签密者秘密信息,实现了密钥生成中心的不可诬陷性。与典型的基于身份的门限签密方案相比,效率更高,实用性更强。

    Abstract:

    Against the shortage of low efficiency of the existing threshold signcryption scheme and the key escrow in the id-based cryptosystem, a new identity-based (t, n) threshold signature encryption scheme is proposed from bilinear pairings. Our scheme can resist the private key generator to entrap through the introduction of secret information of the signcryptioner. Our scheme is more efficient and practical than the existing scheme.

    参考文献
    1 Zheng Y. Digital signcryption or how to achieve cost(Signature&Encryption)<
    2 Zheng Y. Signcryption and its applications in efficient public key solution. ISW’97. LNCS 1397, Springer-Verlag, 1998:291-312.
    3 Shamir A. Identity-based cryptosystems and signature schemes. Advances in Cryptology-Crypto’84, LNCS 196, New York: Springer-Verlag, 1984. 47-53.
    4 Duan S, Cao Z, Lu R. Robust ID-based threshold signcryption scheme from pairings. 3rd International Conference on Information Security. Shanghai, China, 2004. 33-37.
    5 Li FG, Yu Y. Click on a pin to refine search results Reset Map Center and Zoom An efficient and Provably Secure IDBased Threshold Signcryption Scheme. 2008 International Conference on Communications, Circuits and Systems Proceedings ICCCAS 2008. Xiamen, Fujian Province, China, 2008. 488-492.
    6 Selvi SS, Vivek SS, Rangan CP, Jain N. Cryptanalysis of Li et al.’s identity-based threshold signcryption scheme. Proc. of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Shanghai, China, 2008. 127-132.
    7 Boneh D, Franklin M. Identity-based encryption from the Weil pairing. Advances in Cryptology- Crypro’2001, Berlin: Springer-Verlag, 2001. 213-229.
    8 Baek J, Zheng Y. Identity-based threshold signature scheme from the bilinear pairings. International Conference on Information Technology: Coding and Computing-ITCC’04, LasVegas. Nevada, USA, 2004. 124-128.
    9 彭华熹,冯登国.一个基于双线性映射的前向安全门限签案.计算机研究与发展,2007,44(4):574-580.
    10 Peng C, Li X. An identity-based threshold signcryption scheme with semantic security. Computational Intelligence and Security-CIS 2005. Xi’an, China. 173-179.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

朱春意,陈勤,徐坤.新的基于身份的(t, n)门限签密方案.计算机系统应用,2011,20(4):55-58

复制
分享
文章指标
  • 点击次数:2118
  • 下载次数: 3339
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2010-08-10
  • 最后修改日期:2010-09-11
文章二维码
您是第12856857位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京海淀区中关村南四街4号 中科院软件园区 7号楼305房间,邮政编码:100190
电话:010-62661041 传真: Email:csa (a) iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号