Journal on Communications ›› 2020, Vol. 41 ›› Issue (1): 53-65.doi: 10.11959/j.issn.1000-436x.2020002
• Papers • Previous Articles Next Articles
Yiliang HAN,Zhong WANG
Revised:
2019-11-15
Online:
2020-01-25
Published:
2020-02-11
Supported by:
CLC Number:
Yiliang HAN,Zhong WANG. Code-based generalized signcryption scheme with multi-receiver[J]. Journal on Communications, 2020, 41(1): 53-65.
[1] | SHOR P W . Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J]. SIAM Journal on Computing, 1997,26(5): 1484-1509. |
[2] | BERNSTEIN D J , BUCHMANN J , DAHMEN E . Post quantum cryptography[C]// Springer, 2009: 73-80. |
[3] | 郭秋玲, 向宏, 蔡斌 ,等. 基于多变量公钥密码体制的门限环签名方案[J]. 密码学报, 2018,5(2): 140-150. |
GUO Q L , XIANG H , CAI B ,et al. Threshold ring signature scheme based on multivariate public key cryptosystems[J]. Journal of Cryptologic Research, 2018,5(2): 140-150. | |
[4] | 汤海婷, 汪学明 . 一种基于格的属性多重加密方案[J]. 计算机工程, 2018,44(2): 193-196. |
TANG H T , WANG X M . An attribute multiple encryption scheme based on lattices[J]. Computer Engineering, 2018,44(2): 193-196. | |
[5] | 徐权佐, 蔡庆军 . 一种基于编码的公钥密码体制的参数选择研究[J]. 信息网络安全, 2014(10): 54-58. |
XU Q Z , CAI Q J . Research on parameter selection of a code-based public-key cryptosystem[J]. Netinfo Security, 2014(10): 54-58. | |
[6] | 张焕国, 管海明, 王后珍 . 量子计算的挑战与思考[J]. 云南民族大学学报(自然科学版), 2011,20(5): 388-395. |
ZHANG H G , GUAN H M , WANG H Z . The challenge of quantum computing to information security and our countermeasures[J]. Journal of Yunnan University of Nationalities(Natural Sciences Edition), 2011,20(5): 388-395. | |
[7] | YAN S Y . Quantum attacks on public-key cryptosystems[M]. Berlin: SpringerPress, 2013. |
[8] | MCELIECE R J . A public-key cryptosystem based on algebraic coding theory[J]. The Deep Space Network Progress Report, 1978,4244: 114-116. |
[9] | NIEDERREITER H . Knapsack-type cryptosystems and algebraic coding theory[J]. Problems Control Inform Theory, 1986,15(2): 159-166. |
[10] | COURTOIS N T , FINIASZ M , SENDRIER N . How to achieve a McEliece-based digital signature scheme[C]// Advances in CryptologyASIACRYPT 2001. 2001: 157-174. |
[11] | MATHEW K P , VASANT S , RANGAN C P . A provably secure signature and signcryption scheme using the hardness assumptions in coding theory[C]// Information Security and Cryptology—ICISC 2013. Springer International Publishing, 2013: 342-362. |
[12] | GABORIT P , . Shorter keys for code based cryptography[C]// The International Workshop on Coding and Cryptography (WCC 2005). Bergen,Norway, 2005: 81-90. |
[13] | MONICO C , ROSENTHAL J , SHOKROLLAHI A . Using low density parity check codes in the McEliece cryptosystem[C]// IEEE International Symposium on Information Theory. IEEE, 2000:215. |
[14] | OTMANI A , TILLICH J P , DALLOT L . Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes[J]. Mathematics in Computer Science, 2010,3(2): 129-140. |
[15] | LONDAHL C , JOHANSSON T . A new version of McEliece PKC based on convolutional codes[C]// International Conference on Information and Communications Security. Springer, 2012: 461-470. |
[16] | BALDI M . QC-LDPC code-based cryptography[M]. Berlin: SpringerPress, 2014. |
[17] | 李梦东, 孙玉情, 韦依儿 ,等. 改进的基于奇偶校验码的 McEliece变型方案[J]. 计算机应用研究, 2019(11): 1-7. |
LI M D , SUN Y Q , WEI Y E ,et al. Improved McEliece variant scheme based on parity-check codes[J]. Application Research of Computers, 2019(11): 1-7. | |
[18] | DENEUVILLE J C , GABORIT P , ZéMOR G . Ouroboros:a simple,secure and efficient key exchange protocol based on coding theory[C]// International Workshop on Post-quantum Cryptography. Springer, 2017: 18-34. |
[19] | BALDI M , BARENGHI A , CHIARALUCE F ,et al. LEDAkem:a post-quantum key encapsulation mechanism based on QC-LDPC codes[C]// International Conference on Post-Quantum Cryptography. Springer, 2018: 3-24. |
[20] | EATON E , LEQUESNE M , PARENT A ,et al. QC-MDPC:a timing attack and a CCA2 KEM[C]// International Conference on PostQuantum Cryptography. Springer, 2018: 47-76. |
[21] | ZHENG Y , . Digital signcryption or how to achieve cost (signature &encryption) cost(signature)+cost(encryption)[C]// Annual International Cryptology Conference. Springer, 1997: 165-179. |
[22] | 韩益亮, 杨晓元 . ECDSA 可公开验证广义签密[J]. 计算机学报, 2006,29(11): 105-114. |
HAN Y L , YANG X Y . New ECDSA-verifiable generalized signcryption[J]. Chinese Journal of Computers, 2006,29(11): 105-114. | |
[23] | AL-RIYAMI S S , PATERSON K G . Certificateless public key cryptograph[C]// International Conference on the Theory and Application of Cryptology and Information Security. Springer, 2003: 452-473. |
[24] | BARBOSA M , FARSHIM P . Certificateless signcryption[C]// The ACM Symposium on Information,Computer and Communications Security. ACM, 2008: 369-372. |
[25] | SELVI S S D , VIVEK S S , SHUKLA D ,et al. Efficient and provably secure certificateless multi-receiver signcryption[C]// International Conference on Provable Security. Springer, 2008: 52-67. |
[26] | 李慧贤, 陈绪宝, 庞辽军 ,等. 基于多变量公钥密码体制的无证书多接收者签密体制[J]. 计算机学报, 2012,35(9): 93-101. |
LI H X , CHEN X B , PANG L J ,et al. Certificateless multi-receiver signcryption scheme based on multivariate public key cryptography[J]. Chinese Journal of Computers, 2012,35(9): 93-101. | |
[27] | YUNG M . Practical signcryption[M]. Springer Science & Business Media, 2010. |
[28] | 屈娟, 李艳平, 李丽 . 普适计算中匿名跨域认证协议的分析与改进[J]. 信息网络安全, 2018(1): 73-79. |
QU J , LI Y P , LI L . Cryptanalysis and security enhancement of an efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks[J]. Netinfo Security, 2018(1): 73-79. | |
[29] | 周彦伟, 杨波, 张文政 . 普适计算环境下的安全访问模型[J]. 电子学报, 2017,45(4): 959-965. |
ZHOU Y W , YANG B , ZHANG W Z . Security access model in pervasive computing environment[J]. Acta Electronica Sinica, 2017,45(4): 959-965. | |
[30] | HAN Y , GUI X . Adaptive secure multicast in wireless networks[J]. International Journal of Communication Systems, 2009,22(9): 1213-1239. |
[31] | 韩益亮, 蓝锦佳, 杨晓元 . 基于 LRPC 码和多变量的签密方案[J]. 密码学报, 2016,3(1): 56-66. |
HAN Y L , LAN J J , YANG X Y . A signcryption scheme based on LRPC and multivariate cryptosystem[J]. Journal of Cryptologic Research, 2016,3(1): 56-66. | |
[32] | LI P C , HE M X , LI X ,et al. Efficient and provably secure certificateles signcryption from bilinear pairings[J]. Journal of Computational Information Systems, 2010,6(11): 3643-3650. |
[33] | 朱辉, 李晖, 王育民 . 不使用双线性对的无证书签密方案[J]. 计算机研究与发展, 2010,47(9): 1587-1594. |
ZHU H , LI H , WANG Y M . Certificateless signcryption scheme without bilinear pairing[J]. Journal of Computer Research and Development, 2010,47(9): 1587-1594. |
[1] | Wenbo ZHANG, Wenhua HUANG, Jingyu FENG. Secure communication mechanism for VSN based on certificateless signcryption [J]. Journal on Communications, 2021, 42(7): 128-136. |
[2] | Xiaodong YANG, Wanting XI, Jiaqi WANG, Aijia CHEN, Caifen WANG. Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain [J]. Journal on Communications, 2021, 42(12): 236-246. |
[3] | Zhen LIU,Yiliang HAN,Xiaoyuan YANG,Shuguang LIU. Provable security signcryption scheme based on RLWE without trapdoor [J]. Journal on Communications, 2020, 41(6): 14-25. |
[4] | Changgen PENG, Xiaoyu ZHANG, Hongfa DING, Shanhui YANG. Efficient signcryption scheme based on Cocks’ identity cryptosystem [J]. Journal on Communications, 2020, 41(12): 128-138. |
[5] | Yan-lin QIN,Xiao-ping WU,Wei HU. Leakage-resilient certificateless signcryption scheme [J]. Journal on Communications, 2017, 38(Z2): 43-50. |
[6] | Shu-fen NIU,Ling NIU,Cai-fen WANG,Ya-hong LI. Certificateless generalized signcryption scheme in the standard model [J]. Journal on Communications, 2017, 38(4): 35-45. |
[7] | Cai-fen WANG,Chao LIU,Ya-hong LI,Shu-fen NIU,Yu-lei ZHANG. Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC [J]. Journal on Communications, 2017, 38(10): 10-17. |
[8] | Yan-lin QIN,Xiao-ping WU,Wei HU. Efficient certificateless multi-receiver anonymous signcryption scheme [J]. Journal on Communications, 2016, 37(6): 129-136. |
[9] | Bo ZHANG,Tao SUN,Dai-rong YU. Improved identity based multi-receiver anonymous signcryption scheme [J]. Journal on Communications, 2015, 36(9): 109-118. |
[10] | Zhen-guo ZHAO. Security analysis and improvement of a certificateless signcryption scheme [J]. Journal on Communications, 2015, 36(3): 75-80. |
[11] | . Analysis and improvement of an identity-based signcryption [J]. Journal on Communications, 2015, 36(11): 174-179. |
[12] | Liao-jun PANG,Lu GAO,Qing-qi PEI,Yu-min WANG. Fair and anonymous ID-based multi-receiver signcryption [J]. Journal on Communications, 2013, 34(8): 161-168. |
[13] | . Fair and anonymous ID-based multi-receiver signcryption [J]. Journal on Communications, 2013, 34(8): 21-168. |
[14] | . Attribute-based key-insulated signcryption with bidirectional anonymity [J]. Journal on Communications, 2013, 34(11): 6-50. |
[15] | Xing-lan ZHANG,Zhen ZHANG. Attribute-based key-insulated signcryption with bidirectional anonymity [J]. Journal on Communications, 2013, 34(11): 42-50. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|