ID-based Signcryption KEM to Multiple Recipients  被引量:14

ID-based Signcryption KEM to Multiple Recipients

在线阅读下载全文

作  者:SUN Yinxia LI Hui 

机构地区:[1]Key Laboratory of Computer Networks and Information Security, Ministry of Education, Xidian University, Xi'an 710071, China

出  处:《Chinese Journal of Electronics》2011年第2期317-322,共6页电子学报(英文版)

基  金:This work is supported by the National Natural Science Foundation of China (No.60772136, No.61003300), 863 Hi-Tech Research and Development Program of China (No.2007AA01Z435), National Key Technology R&D Program of China during the 9th Five-Year Plan Period (No.2008BAH22B03, No.2007BAH08B01), National 111 Program (No.B08038) and Fundamental Research Funds for the Central Universities 'No.JY10000901021).

摘  要:Identity based signcryption Key encapsulation mechanism (KEM) is used to encapsulate a symmetric key during the construction of hybrid signcryption in the identity based setting. We introduce the notion of Identity based signcryption KEM to multiple recipients (mIDSC-KEM), and define security models for this new primitive. We illustrate by proposing an efficient mIDSCKEM scheme. Our scheme is proved secure in the random oracle model under the Gap bilinear Diffie-Hellman (Gap-BDH) and the Computational Diflfle-Hellman (CDH) assumption.

关 键 词:Identity based signcryption KEM Multiple recipients INDISTINGUISHABILITY UNFORGEABILITY Random oracle model Gap bilinear Diffie-Hellman (Gap- BDH) Computational Diflle-Hellman (CDH). 

分 类 号:TP393[自动化与计算机技术—计算机应用技术] TP393.08[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象