Journal of Frontiers of Computer Science and Technology ›› 2022, Vol. 16 ›› Issue (11): 2519-2530.DOI: 10.3778/j.issn.1673-9418.2104074
• Network and Information Security • Previous Articles Next Articles
CHEN Hong1, ZHOU Mo1,+(), HOU Yuting1, ZHAO Jufang1, XIAO Chenglong2, GUO Pengfei1
Received:
2021-04-14
Revised:
2021-06-09
Online:
2022-11-01
Published:
2021-06-16
About author:
CHEN Hong, born in 1967, M.S., associate professor, member of CCF. Her research interests include information security and network security.Supported by:
陈虹1, 周沫1,+(), 侯宇婷1, 赵菊芳1, 肖成龙2, 郭鹏飞1
通讯作者:
+ E-mail: zhou0123elf@163.com作者简介:
陈虹(1967—),女,辽宁阜新人,硕士,副教授,CCF会员,主要研究方向为信息安全、网络安全。基金资助:
CLC Number:
CHEN Hong, ZHOU Mo, HOU Yuting, ZHAO Jufang, XIAO Chenglong, GUO Pengfei. Certificateless Aggregate Signcryption Scheme with Publicly Verifiable Pairless Operation[J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(11): 2519-2530.
陈虹, 周沫, 侯宇婷, 赵菊芳, 肖成龙, 郭鹏飞. 可公开验证无对运算的无证书聚合签密方案[J]. 计算机科学与探索, 2022, 16(11): 2519-2530.
方案 | 签密运算量(1个消息) | 解签密运算量(1个消息) | 运算总量(1个消息) | 签密运算量(n个消息) | 解签密运算量(n个消息) | 运算总量(n个消息) | 安全性 | 公开验证性 |
---|---|---|---|---|---|---|---|---|
文献[ | 3s | 5s | 8s | 3ns | 4ns | 7ns | √ | × |
文献[ | 3s | 4s | 7s | (2n+1)s | 4ns | (6n+1)s | √ | √ |
文献[ | 4s | 5s | 9s | (3n+3)s | 4ns | (7n+3)s | √ | √ |
文献[ | 5s | 6s | 11s | (2n+1)s | (5n+1)s | (7n+2)s | √ | √ |
文献[ | e+p+2s | 3p | e+4p+2s | ne+p+2ns | 3p | ne+4p+2ns | √ | × |
文献[ | e+4s | 3p+s | e+3p+5s | ne+4ns | (n+2)p+ns | ne+(n+2)p+5ns | √ | × |
本文方案 | 3s | 3s | 6s | (2n+1)s | 3ns | (5n+1)s | √ | √ |
Table 1 Comparison of efficiency and security of signcryption schemes
方案 | 签密运算量(1个消息) | 解签密运算量(1个消息) | 运算总量(1个消息) | 签密运算量(n个消息) | 解签密运算量(n个消息) | 运算总量(n个消息) | 安全性 | 公开验证性 |
---|---|---|---|---|---|---|---|---|
文献[ | 3s | 5s | 8s | 3ns | 4ns | 7ns | √ | × |
文献[ | 3s | 4s | 7s | (2n+1)s | 4ns | (6n+1)s | √ | √ |
文献[ | 4s | 5s | 9s | (3n+3)s | 4ns | (7n+3)s | √ | √ |
文献[ | 5s | 6s | 11s | (2n+1)s | (5n+1)s | (7n+2)s | √ | √ |
文献[ | e+p+2s | 3p | e+4p+2s | ne+p+2ns | 3p | ne+4p+2ns | √ | × |
文献[ | e+4s | 3p+s | e+3p+5s | ne+4ns | (n+2)p+ns | ne+(n+2)p+5ns | √ | × |
本文方案 | 3s | 3s | 6s | (2n+1)s | 3ns | (5n+1)s | √ | √ |
[1] | ZHENG Y L. Digital signcryption or how to achieve cost (sig-nature & encryption)≪ cost (signature)+ cost (encryption)[C]// LNCS 1294: Proceedings of the 17th Annual Interna-tional Cryptology Conference, Santa Barbara, Aug 17-21, 1997. Berlin, Heidelberg: Springer, 1997: 165-179. |
[2] | BAEK J, STEINFELD R, ZHENG Y. Formal proofs for the security of signcryption[C]// LNCS 2274: Proceedings of the 5th International Workshop on Public Key Cryptography, Paris, Feb 12-14, 2002. Berlin, Heidelberg: Springer, 2002: 80-98. |
[3] | MALONE-LEE J. Identity-based signcryption[J]. IACR Cryp-tology ePrint Archive, 2002. |
[4] | CHEN L Q, MALONE-LEE J. Improved identity-based sign-cryption[C]// LNCS 3386: Proceedings of the 8th International Workshop on Theory and Practice in Public Key Crypto-graphy, Les Diablerets, Jan 23-26, 2005. Berlin, Heidel-berg: Springer, 2005: 362-379. |
[5] |
李建民, 俞惠芳, 赵晨. UC安全的自认证盲签密协议[J]. 计算机科学与探索, 2017, 11(6): 932-940.
DOI |
LI J M, YU H F, ZHAO C. Self-certified blind signcryption protocol with UC security[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(6): 932-940.
DOI |
|
[6] | 陈虹, 赵悦, 肖成龙, 等. 可证安全的无对运算的无证书签密方案[J]. 计算机应用研究, 2019, 36(3): 907-910. |
CHEN H, ZHAO Y, XIAO C L, et al. Certificateless sign-cryption scheme of verifiable security without pairing[J]. Application Research of Computers, 2019, 36(3): 907-910. | |
[7] | ALI I, LAWRENCE T, OMALA A A, et al. An efficient hybrid signcryption scheme with conditional privacy preser-vation for heterogeneous vehicular communicati on in vanets[J]. IEEE Transactionson Vehicular Technology, 2020, 69(10): 11266-11280. |
[8] | ZIA M, ALI R. A multi recipient aggregate signcryption sch-eme based on elliptic curve[J]. Wireless Personal Commu-nications, 2020, 115(2): 1465-1480. |
[9] |
陈虹, 朱亚囡, 肖成龙, 等. 可公开验证无证书的多接收者匿名签密方案[J]. 计算机工程与应用, 2020, 56(19): 120-125.
DOI |
CHEN H, ZHU Y N, XIAO C L, et al. Publicly verifiable certificateless multi-receiver anonymous signcryption[J]. Com-puter Engineering and Applications, 2020, 56(19): 120-125. | |
[10] | GUO H, DENG L. Certificateless ring signcryption scheme from pairings[J]. International Journal of Network Security, 2020, 22(1): 102-111. |
[11] | SELVI S S D, VIVEK S S, SHRIRAM J, et al. Identity based aggregate signcryption schemes[C]// LNCS 5922: Proceedings of the 10th International Conference on Cryptology, New Delhi, Dec 13-16, 2009. Berlin, Heidelberg: Springer, 2009: 378-397. |
[12] |
ABOUELKHEIR E, EL-SHERBINY S. Pairing free identity based aggregate signcryption scheme[J]. IET Information Security, 2020, 14(6): 625-632.
DOI URL |
[13] | AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]// LNCS 2894: Proceedings of the 9th Inter-national Conference on the Theory and Application of Cry-ptology and Information Security, Taipei, China, Nov 30-Dec 4, 2003. Berlin, Heidelberg: Springer, 2003: 452-473. |
[14] | LU H, XIE Q. An efficient certificateless aggregate signcry-ption scheme from pairings[C]// Proceedings of the 2011 Inter-national Conference on Electronics, Communications and Con-trol, Ningbo, Sep 9-11, 2011. Piscataway: IEEE, 2011: 132-135. |
[15] |
ESLAMI Z, PAKNIAT N. Certificateless aggregate signcryp-tion: security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286.
DOI URL |
[16] | 张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015, 37(12): 2838-2844. |
ZHANG Y L, WANG H, LI C Y, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2838-2844. | |
[17] |
刘建华, 毛可飞, 胡俊伟. 基于双线性对的无证书聚合签密方案[J]. 计算机应用, 2016, 36(6): 1558-1562.
DOI |
LIU J H, MAO K F, HU J W. Certificateless aggregate sign-cryption scheme based on bilinear pairings[J]. Journal of Com-puter Applications, 2016, 36(6): 1558-1562. | |
[18] |
苏靖枫, 柳菊霞. 不含双线性对的高效无证书聚合签密方案[J]. 计算机应用, 2018, 38(2): 374-378.
DOI |
SU J F, LIU J X. Efficient certificateless aggregate signcryp-tion scheme without bilinear pairings[J]. Journal of Computer Applications, 2018, 38(2): 374-378. | |
[19] | 李晨, 祁正华. 高效安全的无证书聚合签密方案[J]. 计算机技术与发展, 2020, 30(10): 117-122. |
LI C, QI Z H. An efficient and safe certificateless signcr-yption scheme[J]. Computer Technology and Development, 2020, 30(10): 117-122. | |
[20] | 胡荣磊, 李文敬, 蒋华, 等. 适用于物联网通信的无证书聚合签密算法[J]. 计算机应用研究, 2020, 37(1): 208-211. |
HU R L, LI W J, JIANG H, et al. Certificateless aggregate signcryption scheme for IoT communication[J]. Application Research of Computers, 2020, 37(1): 208-211. | |
[21] | 牛淑芬, 李振彬, 王彩芬. 适用于车载网的匿名异构聚合签密方案[J]. 计算机工程与科学, 2019, 41(1): 80-87. |
NIU S F, LI Z B, WANG C F. An anonymous heteroge-neous aggregate signcryption scheme for vehicular networks[J]. Computer Engineering & Science, 2019, 41(1): 80-87. | |
[22] | 刘祥震, 张玉磊, 郎晓丽, 等. 可证安全的隐私保护多接收者异构聚合签密方案[J]. 计算机工程与科学, 2020, 42(3): 441-448. |
LIU X Z, ZHANG Y L, LANG X L, et al. A provably secure privacy-preserving multi-recipient heterogeneous aggregate signcryption scheme[J]. Computer Engineering & Science, 2020, 42(3): 441-448. | |
[23] |
QU Y, MU Q. An efficient certificateless aggregate signature without pairing[J]. International Journal of Electronic Security and Digital Forensics, 2018, 10(2): 188-203.
DOI URL |
[24] | 牛淑芬, 牛灵, 王彩芬, 等. 一种可证安全的异构聚合签密方案[J]. 电子与信息学报, 2017, 39(5): 1213-1218. |
NIU S F, NIU L, WANG C F, et al. A provable aggregate signcryption for heterogeneous systems[J]. Journal of Elec-tronics & Information Technology, 2017, 39(5): 1213-1218. | |
[25] |
CAO X, KOU W, DU X. A pairing-free identity-based authent-icated key agreement protocol with minimal message excha-nges[J]. Information Sciences, 2010, 180(15): 2895-2903.
DOI URL |
[1] | XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming. Forward Secure Sequential Aggregate Signature Schemes on Lattice [J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(9): 1658-1666. |
[2] | XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming. Forward Secure Lattice-Based Sequential Aggregate Signature Schemes in Stan-dard Model [J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(10): 1912-1920. |
[3] | ZHAO Zongqu, FAN Tao, PENG Tingting, YE Qing, QIN Panke. Key Encapsulation Mechanism from Lattice in Standard Model [J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(4): 629-638. |
[4] | TANG Yongli, WANG Feifei, YE Qing, YAN Xixi. Provably Secure Efficient Certificateless Proxy Signature Scheme [J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(9): 1282-1289. |
[5] | ZHOU Conghua, LIU Zhifeng, WU Hailing, CHEN Song. Syntactic Information Flow Analysis Based on Nontransitive Security Policy [J]. Journal of Frontiers of Computer Science and Technology, 2011, 5(2): 179-192. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 192
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 301
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
/D:/magtech/JO/Jwk3_kxyts/WEB-INF/classes/