廖钰城, 王立斌, 黄杰彬. 完整内部安全的混合签密方案设计与分析[J]. 华南师范大学学报(自然科学版), 2022, 54(6): 119-127. doi: 10.6054/j.jscnun.2022093
引用本文: 廖钰城, 王立斌, 黄杰彬. 完整内部安全的混合签密方案设计与分析[J]. 华南师范大学学报(自然科学版), 2022, 54(6): 119-127. doi: 10.6054/j.jscnun.2022093
LIAO Yucheng, WANG Libin, HUANG Jiebin. Design and Analysis of Hybrid Signcryption Scheme with Full Insider Security[J]. Journal of South China Normal University (Natural Science Edition), 2022, 54(6): 119-127. doi: 10.6054/j.jscnun.2022093
Citation: LIAO Yucheng, WANG Libin, HUANG Jiebin. Design and Analysis of Hybrid Signcryption Scheme with Full Insider Security[J]. Journal of South China Normal University (Natural Science Edition), 2022, 54(6): 119-127. doi: 10.6054/j.jscnun.2022093

完整内部安全的混合签密方案设计与分析

Design and Analysis of Hybrid Signcryption Scheme with Full Insider Security

  • 摘要: 设计达到完整内部安全的混合签密方案(HSC)是目前亟待解决的重要问题,而如何实现高效安全的签密密钥封装机制(SC-KEM)则是解决该问题的关键。为此,先设计一种带标签的签密密钥封装机制(SC-tag-KEM)的通用构造方案(SCtKstd),该方案通过签名绑定标签与密钥封装报文,将得到的签名和临时密钥使用消息认证码进行绑定。在标准模型下进行的安全性分析表明SCtKstd方案可达到DM-IND-iCCA安全和DM-SUF-iCMA安全,进而为达成完整内部安全奠定基础。然后,将SCtKstd方案与被动安全对称加密机制结合,构造了一种可达完整内部安全的混合签密的通用构造方案(HSCstd)。在标准模型下进行的安全性分析表明HSCstd方案同时具备IND-CCA2安全与SUF-CMA安全,进而达到完整内部安全。

     

    Abstract: Currently, it is of significant importance to design a hybrid signcryption scheme (HSC) with full insider security, and one of the crucial methods is to implement an efficient and secure signcryption key encapsulation mechanism (SC-KEM). To this goal, a new generic construction scheme (HSCstd) of secure signcryption tag key encapsulation mechanism (SC-tag-KEM) is proposed, which signing a tag together with the encapsulation of key, and using message authentication code binding of the signature and the ephemeral key to achieve DM-IND-iCCA security and DM-SUF-iCMA security under the standard model, thus the foundation for full insider security is established. Furthermore, combined with the passive-secure symmetric encryption scheme, a new generic construction (HSCstd) of hybrid signcryption scheme achieving the full insider security is presented. It is analysed to achieve DM-CCA2 security and SUF-CMA security under the standard model, thus achieving the full insider security.

     

/

返回文章
返回