信息网络安全 ›› 2016, Vol. 16 ›› Issue (11): 66-72.doi: 10.3969/j.issn.1671-1122.2016.11.011

• • 上一篇    下一篇

基于准循环低密度奇偶校验码的签密方案研究

刘明烨1,2(), 韩益亮1,2, 杨晓元1,2   

  1. 1.武警工程大学电子技术系,陕西西安 710086
    2.武警部队网络与信息安全保密重点实验室,陕西西安 710086
  • 收稿日期:2016-08-20 出版日期:2016-11-20 发布日期:2020-05-13
  • 作者简介:

    作者简介:刘明烨(1991—),男,广东,硕士研究生,主要研究方向为公钥密码学;韩益亮(1977—),男,甘肃,副教授,博士,主要研究方向为密码学;杨晓元(1959—),男,湖南,教授,硕士,主要研究方向为密码学、可信计算。

  • 基金资助:
    国家自然科学基金[61572521,61272492,61272468];陕西省自然科学基础研究计划[2015JM6353]

Research of Signcyption Based on QC-LDC

Mingye LIU1,2(), Yiliang HAN1,2, Xiaoyuan YANG1,2   

  1. 1. Department of Electronic Technology, Engineering University of Chinese People’s Armed Police Force, Xi’an Shaanxi 710086, China;
    2. Key Laboratory of Network and Information Security, Chinese People’s Armed Police Force, Xi’an Shaanxi 710086, China;
  • Received:2016-08-20 Online:2016-11-20 Published:2020-05-13

摘要:

签密是一个能同时实现数字签名和公钥加密的密码原语,并且其数据量要远低于传统的先签名后加密的方法。基于编码的密码体制是后量子密码中的一个重要方案,具有较高的计算效率,但是有密钥量过大的问题。针对这一问题,文章尝试利用准循环低密度奇偶校验码,在随机预言机的模型下,构造了一个可证明安全的签密方案。由于QC-LDPC的校验矩阵的准循环特性,可以有效地减小密钥量,与传统的先签名后加密的方法相比,密文减少了15.7%,与“一石二鸟”等基于数论的签密方案相比,计算效率有较大提高。安全性表明,方案在随机预言机模型下能达到IND-CCA2和EUF-CMA安全。

关键词: 签密, 后量子密码, 基于编码的密码体制, 准循环低密度奇偶校验码, 可证明安全

Abstract:

Signcryption is a cryptographic primitive that performs both the function of digital signature and public-key encryption, at a cost significantly lower than that required in the traditional signature-then encryption. Code based cryptography is an important scheme in post-quantum cryptography. Its computational efficiency is high but it has the drawback of large key. Aiming at solving this problem, a signcryption based on QC-LDPC was proposed the random oracle model. Because of the quasi cyclic property of the parity check matrix of QC-LDPC codes, the size of key can be efficiently reduced, and compared with the traditional approach of signature-then encryption, the ciphertext is 25% less. And the computational efficiency is high than the signcryption based on number theory such as “Two birds one stone”. Security analyse show that it satisfies IND-CCA2 and EUF-CMA security under random oracle model.

Key words: signcryption, post-quantum cryptography, code-based cryptography, QC-LDPC, provably secure

中图分类号: