电子学报 ›› 2016, Vol. 44 ›› Issue (10): 2432-2439.DOI: 10.3969/j.issn.0372-2112.2016.10.022

• 学术论文 • 上一篇    下一篇

匿名CLPKC-TPKI异构签密方案

张玉磊1, 张灵刚1, 张永洁2, 王欢1, 王彩芬1   

  1. 1. 西北师范大学计算机科学与工程学院, 甘肃兰州 730070;
    2. 甘肃卫生职业学院, 甘肃兰州 730000
  • 收稿日期:2015-06-17 修回日期:2015-12-23 出版日期:2016-10-25 发布日期:2016-10-25
  • 通讯作者: 张永洁
  • 作者简介:张玉磊,男,1979年出生于甘肃靖远,博士,西北师范大学计算机科学与工程学院副教授,硕士生导师.研究方向为网络与信息安全、密码学、安全协议分析与设计.E-mail:zhangyl@nwnu.edu.cn;张灵刚,男,1990年出生于甘肃省灵台县,西北师范大学计算机科学与工程学院硕士生.研究方向为网络与信息安全.E-mail:linggang01@126.com;王欢,女,1991年出生于河北省枣强县,西北师范大学计算机科学与工程学院硕士生研究生.研究方向为网络与信息安全.E-mail:1530749678@qq.com
  • 基金资助:

    国家自然科学基金(No.61163038,No.61262056,No.61262057);甘肃省高等学校科研项目(No.2015B-220,No.2013A-014);西北师范大学青年教师科研能力提升计划项目(No.NWNU-LKQN-12-32)

CLPKC-to-TPKI Heterogeneous Signcryption Scheme with Anonymity

ZHANG Yu-lei1, ZHANG Ling-gang1, ZHANG Yong-jie2, WANG Huan1, Wang Cai-fen1   

  1. 1. College of Computer Science and Engineering, Northwest Normal University, Lanzhou, Gansu 730070, China;
    2. Gansu Health Vocational College, Lanzhou, Gansu 730000, China
  • Received:2015-06-17 Revised:2015-12-23 Online:2016-10-25 Published:2016-10-25

摘要:

异构签密可以保证不同公钥密码系统之间数据传输的机密性和不可伪造性.本文定义了从无证书公钥密码环境到传统公钥密码环境(CLPKC→TPKI)异构签密方案的形式化模型,并利用双线性对提出了一个CLPKC→TPKI异构签密方案.在随机预言模型下,基于计算Diffie-Hellman和修改逆计算Diffie-Hellman困难假设,证明方案满足内部安全的机密性和不可伪造性.同时,方案满足密文匿名性,可以有效地保护收发双方的身份隐私.方案使用不同的密码系统参数,更接近于实际应用环境.与已有异构签密方案相比,方案的效率较高,适合于收发双方身份保密和带宽受限的应用需求.

关键词: 异构签密, 无证书公钥密码, 密文匿名, 计算Diffie-Hellman困难问题, 修改逆计算Diffie-Hellman困难问题

Abstract:

Heterogeneous signcryption,a cryptographic primitive,can simultaneously provide the confidentiality and unforgeability of data transmission between different public key cryptography.The paper gives the definition and security models of CLPKC-to-TPKI heterogeneous signcryption scheme between CLPKC (Certificateless Public Key Cryptography) and TPKI (Traditional Public Key Infrastructure),and presents a construction by using the bilinear pairing.In the random oracle model,based on the assumptions of Computational Diffie-Hellman and modifying Inverse Computational Diffie-Hellman,the scheme is proved to satisfy the confidentiality and unforgeability of the insider security.Moreover,it satisfies the properties of ciphertext anonymity which can efficiently protect the privacies of sender and receiver.Owing to the independence and difference of the system parameters in CLPKC and TPKI,the scheme is more suitable in the practical environments.Furthermore,the analysis of efficiency shows that,comparing to the existing heterogeneous signcryption schemes,the scheme is more efficient,so it is suitable for the requirements of identity hiding and constrained bandwidth.

Key words: heterogeneous signcryption, certificateless public key cryptography, ciphertext anonymity, computational Diffie-Hellman problem (CDH), modification inverse computational Diffie-Hellman problem(mICDH)

中图分类号: