具有附加性质的签密方案及其应用分析-signcryption scheme with additional properties and its application analysis.docxVIP

  • 11
  • 0
  • 约13.03万字
  • 约 134页
  • 2018-08-14 发布于上海
  • 举报

具有附加性质的签密方案及其应用分析-signcryption scheme with additional properties and its application analysis.docx

具有附加性质的签密方案及其应用分析-signcryption scheme with additional properties and its application analysis

ABSTRACTSigncryption isaneffectivecryptographicprimitive,whichsimultaneouslyfulfilsboththefunctionsofencryptionandsignaturewithmuchlowercostthantraditionalschemes;itisanidealmethodtoprovideconfidentialityandunforgeabilitysimultaneously.Inadditiontothebasicsecurityrequirementofsigncryption, signcryptionwithadditionalpropertiesprovestobeapplicabletodifferentenvironmentwithitssuperioradditionalproperties.Withthedevelopmentofnetworkand information sciences, signcryption schemeswith additional properties are playing anincreasinglyimportantroleinmanyelectronictransactions.Thedissertationfocusesonthedesignandanalysisofsecure,efficientandapplicablesigncryptionschemeswithadditionalproperties,themaincontributionsofwhicharesummarizedasfollows.First,weputforwardanefficientpubliclyverifiablesigncryptionS-ECSCwithsecurityproofofconfidentialityinIND-CCA2modelandunforgeabilityinUF-CMA modelandnon-repudiationinRandomOraclemodel.Aspertheefficiencyanalysis,S-ECSCachievesanaverage80%reductionincomputationcostcomparedwithtypicaldiscretelogarithm,RSAbasedsigncryption schemes, and has thelowestcommunicationcostinElgamaltypesigncryptions.Atlast,wetakedistributedkeymanagementprotocolinIOTasanapplicationexampleofS-ECSCforsecureprotocols.Besides, we put forwarda signcryptionschemewith forward security and apubliclyverifiablesigncryptionwithforwardsecurity;makedetailedanalysesonthesecurityandadditionproperties,includingforwardsecurityandpublicverifiability. Efficiencycomparisonwithothertypicalschemesjustifiestheirapplicationtoresource-constrainedcircumstancesowingtotheirlowercostforthesamesecurity.Astoproxysigncryptionschemes,weproposeaprovablysecureanonymous proxyauthorizationschemeECPASandanalyzeitsunforgeabilityinadaptivechosenmessagesattackmodelandnon-repudiationsecurity.Besides,comparisonismadewithothertypicalschemesastocomputationandcommunicationcost.Thenweputforwardanefficientproxysigncryptionschemewithpublicverifiability,andproveitsconfidentialityinIND-CCA2model,unforgeabilityinUF-CMAm

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档