Back
 IIM  Vol.1 No.1 , July 2009
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
Abstract: This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR.
Cite this paper: nullZ. JIANG, Y. WANG, Y. WANG and Y. WANG, "Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model," Intelligent Information Management, Vol. 1 No. 1, 2009, pp. 6-13. doi: 10.4236/iim.2009.11002.
References

[1]   Wang Yu-Min, Liu Jian-Wei. Communication network security- Theory and technique. Xidian University Press, 2002, 5 (王育民, 劉建偉. 通信網的安全—理論與技術. 西安電子科技大學出版社, 2002, 5).

[2]   PKI. http://www.pki-page.org/

[3]   Shamir A.. Identity-based cryptosystems and signature schemes. Advances in Cryptology-Crypto'84, LNCS 196, 1984, Berlin: Springer-Verlag, 47-53.

[4]   Tanaka H.. A realization scheme for the identity-based crypto-system. Advances in Cryptology-Crypto'87, LNCS 293, 1987, Berlin: Springer-Verlag, 341-349.

[5]   Hühnlein D., Jacobson, M. Weber D.. Towards practical non-interactive public key cryptosystems using non-maximal imaginary quadratic orders. Selected Areas in Cryptography, LNCS 2012, 2000, Berlin: Springer-Verlag, 275-287.

[6]   Sakai R., Ohgishi K., Kasahara M.. Cryptosystems based on pairing. Symposium on Cryptography and Information Secu-rity-SCIS’00, 2000, Okinawa, Japan, 26-28.

[7]   Ma Chun-Bo, Ao Jun, He Da-Ke. Multi-Signature and Group Signature Based on Bilinear Pairing. Chinese Journal of Com-puters, 2005, 28(9): 1558-1563 (in Chinese) (馬春波, 敖珺, 何大可. 基於雙線性映射的多重簽名與群簽名. 電腦學報, 2005, 28(9): 1558-1563).

[8]   Boyen X., Waters B. Full-domain subgroup hiding and con-stant-size Group signatures. Advances in Cryptology-PKC'07, LNCS 4450, 2007, Berlin: Springer-Verlag, 1-15.

[9]   Boneh D., Franklin M.. Identity-based encryption from the weil pairing. Advances in Cryptology-Crypto'01, LNCS 2139, 2001, Berlin: Springer-Verlag, 213-22.

[10]   Canetti R., Halevi S., Katz J. A forward-secure public-key en-cryption scheme. Advances in Cryptology-EUROCRYPT'03, LNCS 2656, 2003, Berlin: Springer-Verlag, 255-271.

[11]   Canetti R., Halevi S., Katz J. Chosen-ciphertext security from identity-based encryption. Advances in Cryptology-EUROC RYPT'04, LNCS 3027, 2004, Berlin: Springer-Verlag, 207-22.

[12]   Boneh D., Boyen X. Efficient selective-ID secure identity based encryption without random oracles. Advances in Cryptol-ogy-EUROCRYPT’04, LNCS 3027, 2004, Berlin: Springer- Verlag, 223-238.

[13]   Boneh D., Boyen X. Secure identity based encryption without random oracles. Advances in Cryptology-CRYPTO 2004, LNCS 3152, 2004, Berlin: Springer-Verlag, 443-59.

[14]   Waters B. Efficient identity based encryption without random oracles. Advances in Cryptology-EUROCRYPT'05, LNCS 3494, 2005, Berlin: Springer-Verlag, 114-127.

[15]   Goyal V. Reducing Trust in the PKG in Identity Based Crypto-systems. Advances in Cryptology – CRYPTO'07, NCS 4622, Berlin: Springer, 2007, 430-447.

[16]   Washington L. C.. Elliptic Curve Number Theory and Cryptog-raphy. New York, CRC Press, 2003.

[17]   Boneh D., Franklin M.. Identity-based encryption from the weil pairing. SIAM Journal of Computing, 2003, 32(3): 586-615.

[18]   Ming Yang. Study and design of universal designated verifier signature schemes [Ph. D. dissertation]. Xi'an: Xidian University, 2007, 12 (in Chinese) ([明07] 明洋. 廣義指定驗證者簽名體制的研究和設計[博士論文]. 西安電子科技大學, 2007, 12).

 
 
Top