{"title":"基于身份的一次性公钥方案,用于隐私保护","authors":"Chai Linpeng, Zhang Bin","doi":"10.1109/ISI.2017.8004912","DOIUrl":null,"url":null,"abstract":"The one-off public key scheme gets more and more attention for its security features. However, there are two problems in the current schemes proposed, one is that the security threat of user's privacy disclosure for plaintext transmission, the other one is that attackers can infer the identities of the communication participants via signature correctness verification. For the problem mentioned above, we propose an identity-based one-off public key scheme for privacy preservation based on signcrytion algorithm. the scheme ensures that the confidentiality of the message, and only the specified verifier can verified the signature correctness. Furthermore, The scheme has lower computation and communication overhead compared with current available schemes.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An identity-based one-off public key scheme for privacy preservation\",\"authors\":\"Chai Linpeng, Zhang Bin\",\"doi\":\"10.1109/ISI.2017.8004912\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The one-off public key scheme gets more and more attention for its security features. However, there are two problems in the current schemes proposed, one is that the security threat of user's privacy disclosure for plaintext transmission, the other one is that attackers can infer the identities of the communication participants via signature correctness verification. For the problem mentioned above, we propose an identity-based one-off public key scheme for privacy preservation based on signcrytion algorithm. the scheme ensures that the confidentiality of the message, and only the specified verifier can verified the signature correctness. Furthermore, The scheme has lower computation and communication overhead compared with current available schemes.\",\"PeriodicalId\":423696,\"journal\":{\"name\":\"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISI.2017.8004912\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2017.8004912","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An identity-based one-off public key scheme for privacy preservation
The one-off public key scheme gets more and more attention for its security features. However, there are two problems in the current schemes proposed, one is that the security threat of user's privacy disclosure for plaintext transmission, the other one is that attackers can infer the identities of the communication participants via signature correctness verification. For the problem mentioned above, we propose an identity-based one-off public key scheme for privacy preservation based on signcrytion algorithm. the scheme ensures that the confidentiality of the message, and only the specified verifier can verified the signature correctness. Furthermore, The scheme has lower computation and communication overhead compared with current available schemes.