高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

异构双向签密方案的安全性分析和改进

张玉磊 王欢 刘文静 王彩芬

张玉磊, 王欢, 刘文静, 王彩芬. 异构双向签密方案的安全性分析和改进[J]. 电子与信息学报, 2017, 39(12): 3045-3050. doi: 10.11999/JEIT170203
引用本文: 张玉磊, 王欢, 刘文静, 王彩芬. 异构双向签密方案的安全性分析和改进[J]. 电子与信息学报, 2017, 39(12): 3045-3050. doi: 10.11999/JEIT170203
ZHANG Yulei, WANG Huan, LIU Wenjing, WANG Caifen. Security Analysis and Improvement of Mutual Signcryption Schemes under Heterogeneous Systems[J]. Journal of Electronics and Information Technology, 2017, 39(12): 3045-3050. doi: 10.11999/JEIT170203
Citation: ZHANG Yulei, WANG Huan, LIU Wenjing, WANG Caifen. Security Analysis and Improvement of Mutual Signcryption Schemes under Heterogeneous Systems[J]. Journal of Electronics and Information Technology, 2017, 39(12): 3045-3050. doi: 10.11999/JEIT170203

异构双向签密方案的安全性分析和改进

doi: 10.11999/JEIT170203
基金项目: 

国家自然科学基金(61163038, 61262056),甘肃省高等学校科研项目(2015B-220, 2013A-014),西北师范大学青年教师科研能力提升计划(NWNU-LKQN-14-7)

Security Analysis and Improvement of Mutual Signcryption Schemes under Heterogeneous Systems

Funds: 

The National Natural Science Foundation of China (61163038, 61262056), The Higher Educational Scientific Research Foundation of Gansu Province of China (2015B-220, 2013A-014), The Young Teachers Scientific Research Ability Promotion Program of Northwest Normal University (NWNU- LKQN-14-7)

  • 摘要: 异构签密可以保证异构密码系统之间数据的机密性和不可伪造性。2016年,刘景伟等人提出了传统公钥密码和无证书公钥密码之间的PCHS和CPHS双向异构签密方案。但是,经过分析,发现PCHS方案和CPHS方案均不安全。首先描述了第2类敌手对两个方案的攻击过程,其次分析了两个方案存在第2类敌手攻击的原因,最后对PCHS方案和CPHS方案进行改进。改进方案克服了原方案的安全性问题,保证了传统公钥密码和无证书公钥密码环境之间数据的安全传输。
  • LIBERT B and QUISQUATER J J. Improved signcryption from q-Diffie-Hellman problems[C]. International Conference on Security in Communication Networks, Amalfi, Italy, 2004: 220-234. doi: 10.1007/978-3-540-30598-9_16.
    SUN Y X and LI H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Science China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
    HUANG Q, WONG D S, and YANG G M. Heterogeneous signcryption with key privacy[J]. The Computer Journal, 2011, 54(4): 525-536.doi: 10.1093/comjnl/bxq095.
    FU X T, LI X W, and LIU W. IDPKC-to-TPKC construction of multi-receiver signcryption[C]. International Conference on Intelligent Networking and Collaborative Systems (INCoS), Xi,an, China, 2013: 335-339. doi: 10.1109/INCoS.2013.62.
    LI F G, ZHANG H, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012.2221897.
    张玉磊, 张灵刚, 张永洁, 等. 匿名CLPKC-TPKI异构签密方案[J]. 电子学报, 2016, 44(6): 2432-2439. doi: 10.3969/ j.issn.0372-2112.2016.10.022.
    ZHANG Y L, ZHANG L G, ZHANG Y J, et al. CLPKC to TPKI heterogeneous signcryption scheme with anonymity[J]. Acta Electronica Sinica, 2016, 44(6): 2432-2439. doi: 10.3969/ j.issn.0372-2112.2016.10.022.
    LI F G, HAN Y N, and JIN C H. Practical signcryption for secure communication of wireless sensor networks[J]. Wireless Personal Communications, 2016, 89(4): 1391-1412. doi: 10.1007/s11277-016-3327-4.
    刘景伟, 张俐欢, 孙蓉. 异构系统下的双向签密方案[J]. 电子与信息学报, 2016, 38(11): 2948-2953. doi: 10.11999/JEIT 160056.
    LIU J W, ZHANG L H, and SUN R. Mutual signcryption schemes under heterogeneous systems[J]. Journal of Electronics Information Technology, 2016, 38(11): 2948-2953. doi: 10.11999/JEIT160056.
    AN J H, DODIS Y, and RABIN T. On the security of joint signature and encryption[C]. Proceedings of the Cryptology- EUROCRYPT 2002, Amsterdam, the Netherlands, 2002: 83-107. doi: 10.1007/3-540-46035-7_6.
    ZHANG L, WU Q H, QIN B, et al. Identity-based authenticated asymmetric group key agreement protocol[J]. Journal of Computer Research Development, 2010, 6196(19): 510-519. doi: 10.1007/978-3-642-14031-0_54.
  • 加载中
计量
  • 文章访问数:  652
  • HTML全文浏览量:  78
  • PDF下载量:  184
  • 被引次数: 0
出版历程
  • 收稿日期:  2017-03-06
  • 修回日期:  2017-05-12
  • 刊出日期:  2017-12-19

目录

    /

    返回文章
    返回

    官方微信,欢迎关注