期刊文献+

非双线性映射下一种实用的和可证明安全的IBE方案 被引量:10

An Efficient and Provably Secure IBE Scheme Without Bilinear Map
下载PDF
导出
摘要 根据MOV归约理论,采用双线性映射构造的基于身份加密方案使得该方案不具有椭圆曲线高效的优点.针对这一点,参考组合公钥体制提出了一种非双线性映射下可证明安全的基于身份加密方案,并且通过采用Katz-Wang的双公钥思想,使得该方案在随机预言机模型下的安全性证明中具有"紧"的归约.为了说明提出方案具有较好的实用性,分析了该方案的归约程度和执行效率.为了使提出方案在具有大量用户的系统中同样具有实用性,提出了多域基本模型. According to the MOV reduction theory, the identity-based encryption scheme which is based on the bilinear map will lose the high efficiency of elliptic curve. For this reason, a provably secure identity-based encryption scheme without the bilinear map is proposed, which is based on combined public-key scheme. Furthermore, by applying the pair public-key technology introduced by Katz and Wang, the security proof of the proposed identity-based encryption scheme has "tight" reduction in the random oracle model. For showing the good efficiency of the proposed identity-based encryption scheme, the degree of reduction in the security proof and the performance of time and space complexity are analyzed, and these terms are compared with other identity-based encryption schemes without the bilinear map. Finally, for overcoming the conspiracy attack of combined public-key scheme, the number of users in the proposed identity-based eneryption scheme is confined, thus leading to the result that the proposed identity-based encryption scheme is inefficient when the number of user is too large. So, for keeping the efficiency of the proposed identity-based encryption scheme in the system having a lot of users, multi-field model in the Kerberos protocol is consulted with, and then a basic multi-field model based on the proposed identity-based encryption scheme is proposed.
出处 《计算机研究与发展》 EI CSCD 北大核心 2008年第10期1687-1695,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60703048) 湖北省自然科学基金项目(2007ABA313)~~
关键词 MOV归约 双线性映射 基于身份加密 组合公钥体制 椭圆曲线 随机预言机模型 MOV reduction bilinear map identity-based encryption combined public-key scheme elliptic curve random oracle model
  • 相关文献

参考文献16

  • 1Shamir A. Identity based cryptosystems and signature schemes [C] //Blankley G T, Chaum D, eds. Advances in Cryptology--Proeeedings of CRYPTO'84, LNCS 196. Berlin: Springer, 1985:48-53 被引量:1
  • 2Boneh D, Franklin M. Identity-based encryption from the Well pairing [C] //Advances in Cryptology--Proc of Crypto'2001, LNCS 2139. Berlin; Springer, 2001:231-229 被引量:1
  • 3Boneh D, Boyen X. Efficient selective ID identity based encryption without random Oracles [C] //Advances in Cryptcdogy Proc of EUROCRYPT'2004, LNCS 3027. Berlin: Springer, 2004:223-238 被引量:1
  • 4Boneh D, Boyen X. Secure identity based encryption without random Oracles [C] //Advances in Cryptology Proc of Crypto'2004, LNCS 3152. Berlin: Springer, 2004:443-459 被引量:1
  • 5Waters B. Efficient identity-based eneryption without random Oracles [C] //Advances in Cryptology--Proc of EUROCRYPT'2005, LNCS 3494. Berlin: Springer, 2005: 114-127 被引量:1
  • 6Gentry C. Practical ientity based encyrption without random Oracles [C] //Advances in Cryptology--Proc of EUROCRYPT'2006, LNCS 4004. Berlin: Springer, 2006: 445-464 被引量:1
  • 7Galbraith S D. Supersingular curves in cryptography [C] //Advances in Cryptology--Proc of ASIACRYPT'2001, LNCS 2248. Berlin: Springer, 2001:495-513 被引量:1
  • 8Cocks Clifford. An identity based encryption sheme based on quadratic residues [C] //Proc of the 8th IMA Int Conf on Cryptography and Coding, LNCS 2260. Berlin: Springer, 2001:360-363 被引量:1
  • 9Boneh D, Gentry C, Hamburg M. Space-efficient identity based encryption without pairings [C] //Proc of FOCS'2007. Los Alamitos, CA:IEEE Computer Soeiety, 2007: 647-657 被引量:1
  • 10钟旭,陆浪如,南相浩,洪泽勤.一种基于种子密钥SPK的IBE加密体制设计方案[J].微计算机信息,2005,21(4):226-227. 被引量:12

二级参考文献5

共引文献18

同被引文献68

引证文献10

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部