首页> 外文期刊>The Computer journal >Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings
【24h】

Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings

机译:使用双线性对的无泄漏且可证明安全的无证书签密方案

获取原文
获取原文并翻译 | 示例
           

摘要

Signcryption schemes play a vital role to accomplish confidentiality, integrity, authentication and non-repudiation of messages simultaneously. In the literature, many certificateless signcryption (CLSC) schemes have been designed; however, most of them are vulnerable to ephemeral secret leakage (ESL) attack. In these schemes, sender uses an ephemeral secret to compute a ciphertext on a message. However, there is a possibility to compromise the ephemeral secret, since it is generally pre-computed and stored in an insecure device. Furthermore, it is generated by an external source, which can be controlled by an adversary. Thus, from the knowledge of compromised ephemeral secret, an adversary may calculate the private key of the sender and the message from the eavesdropped ciphertext, and this problem is called ESL attack. In this paper, we proposed a leakage-free CLSC, which is secure against ESL attack in the random oracle model. The proposed scheme provides confidentiality under the Co-Bilinear Diffie-Hellman (Co-BDH) assumption and unforgeability based on Co-Computational Diffie-Hellman assumption.
机译:签密方案对于同时完成消息的机密性,完整性,身份验证和不可否认性至关重要。在文献中,已经设计了许多无证书签密(CLSC)方案。但是,它们中的大多数容易受到临时密钥泄漏(ESL)攻击。在这些方案中,发件人使用临时密钥来计算消息上的密文。但是,由于临时密钥通常是预先计算并存储在不安全的设备中,因此有可能损害临时密钥。此外,它是由外部源生成的,可以由对手控制。因此,从已知的短暂秘密中获悉,攻击者可能会从窃听的密文中计算出发件人的私钥和消息,此问题称为ESL攻击。在本文中,我们提出了一种无泄漏的CLSC,它在随机预言模型中可以安全地抵抗ESL攻击。该方案在Co-Blinear Diffie-Hellman(Co-​​BDH)假设下提供了机密性,并在Co-Computational Diffie-Hellman假设的基础上提供了不可伪造性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号