信息网络安全 ›› 2018, Vol. 18 ›› Issue (10): 62-69.doi: 10.3969/j.issn.1671-1122.2018.10.009

• 技术研究 • 上一篇    下一篇

具有隐私保护特性的证书否认认证加密方案

张玉磊(), 马彦丽, 刘文静, 王彩芬   

  1. 西北师范大学计算机科学与工程学院,甘肃兰州 730070
  • 收稿日期:2018-07-15 出版日期:2018-10-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:张玉磊(1979—),男,甘肃,副教授,博士,主要研究方向为密码学与信息安全;马彦丽(1992—),女,甘肃,硕士研究生,主要研究方向为密码学与信息安全;刘文静(1994—)女,天津,硕士研究生,主要研究方向为密码学与信息安全;王彩芬(1963—),女,河北,教授,博士,主要研究方向为密码学与信息安全。

  • 基金资助:
    国家自然科学基金[61163038,61262056,61262057];甘肃省高等学校科研项目[2017A-003,2018A-207];西北师范大学青年教师科研能力提升计划[NWNU-LKQN-14-7]

A Certificate Denial Authentication Encryption Schemes with Privacy Protection Features

Yulei ZHANG(), Yanli MA, Wenjing LIU, Caifen WANG   

  1. College of Computer Science and Engineering, Northwest Normal University, Lanzhou Gansu 730070,China
  • Received:2018-07-15 Online:2018-10-10 Published:2020-05-11

摘要:

网络信息的快速发展,使得身份信息的安全性变得更为重要。文章基于证书公钥密码体制,提出了一种具有隐私保护特性的证书否认认证加密方案,有效避免了投票者身份在电子投票过程中和发送邮件者在发送邮件过程中存在的安全性问题。文章在随机预言模型下基于数学困难问题证明该方案具有不可区分性和不可伪造性。同时,该方案满足否认性的特点,不仅保护了投票者和发送者身份隐私,并对投票消息和发送消息进行否认以更好地解决隐私问题。与现有的身份否认认证加密方案相比,该方案的加密和验证效率相当,但消除了密钥托管问题。

关键词: 否认认证加密, 证书公钥加密, 随机预言模型, 电子投票

Abstract:

In the rapid development of network information, the security of identity information has become particularly important and critical. Based on the certificate public key cryptosystem, this paper proposes a denial-authentication encryption scheme for certificates with privacy protection features, which effectively avoids the security problems of the voter identity in the electronic voting process and the sender's sending email. Under the random oracle model(ROM), based on the bilinear Diffie-Hellman(BDH) assumption and Computational Diffie-Hellman(CDH) assumption, the scheme is proved to satify the indistinguishability and the existential unforgeability.Meanwhile, the scheme satisfies the denial, not only protects the privacy of voters and senders, but also denies voting messages and sending messages to better solve privacy problems. Compared with the existing identity-based denied authentication encryption schemes, the efficiency of the scheme is equivalent to the above ones in the aspects of encryption and verification, however the key escrow problems of those schemes are eliminated.

Key words: deniable authenticated encryption, certificate-based public key encryption, random oracle model, electronic voting

中图分类号: