通信学报 ›› 2013, Vol. 34 ›› Issue (Z1): 8-13.doi: 10.3969/j.issn.1000-436x.2013.z1.002

• 学术论文 • 上一篇    下一篇

高效的模糊属性基签密方案

杨晓元1,2,林志强1,韩益亮1,2   

  1. 1 武警工程大学 电子技术系 武警部队密码与信息安全保密重点实验室,陕西 西安 710086
    2 武警工程大学 电子技术系 网络与信息安全研究所,陕西 西安 710086
  • 出版日期:2013-08-25 发布日期:2017-06-23
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;陕西省自然科学基础研究计划基金资助项目

Efficient fuzzy attribute-based signcryption scheme

Xiao-yuan YANG1,2,Zhi-qiang LIN1,Yi-liang HAN1,2   

  1. 1 Key Laboratory of the Chinese Armed Police Force for Cryptology and Information Security, Department of Electronic Technology, Engineering University of the Chinese Armed Police Force, Xi'an 710086,China
    2 Institute of Network and Information Security Under the Chinese Armed Police Force, Department of Electronic Technology, Engineering University of the Chinese Armed Police Force, Xi'an 710086,China
  • Online:2013-08-25 Published:2017-06-23
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Natural Science Re-search Project of Shanxi Province

摘要:

多用户通信是当今信息交互的主要模式,提高通信安全性与解决通信效率问题是当前研究的重点。属性基签密保证了多用户在通信中消息的机密性与完整性,并通过一步操作实现对多用户的消息发送,提高了签密的效率。利用密钥共享模型及双线性对,提出一种高效的模糊属性基签密方案,基于DMBDH与CDH问题证明了机密性与不可伪造性,同时还满足可公开验证性与短密文性。分析对比表明,签密与解签密的运算量仅为(n+3)e和ne+(n+4)p,远小于同类方案的运算量,实现了算法的高效性。

关键词: 模糊属性, 密钥共享, 短密文, 可公开验证

Abstract:

Multi-user communication is the major model of present information exchange and to improve communication security and to solve the problem of communication efficiency is the key of present research. Attributed-based signcryp-tion ensures the confidentiality and integrity of the information during communication and realizes the sending of infor-mation through one-step operation, thus improving the efficiency of signcryption. By using secret sharing model and bi-linear pairs, an efficient fuzzy attribute-based signcryption scheme was presented, and based on DMBDH and CDH prob-lem, the confidentiality and unforgeability of the scheme were proved. Meanwhile, it meets public verifiability and short ciphertext. Compared with other analysis, the amount of computation of signcryption and designcryption is only (n+3)e and ne+(n+4)p, far less than those of other similar schemes and this realizes the efficiency of computation.

Key words: fuzzy attribute, secret sharing, short ciphertext, public verifiability

No Suggested Reading articles found!