期刊文献+

一个高效安全的身份基加密方案 被引量:1

An Efficient and Full Secure Identity-Based Encryption Scheme
下载PDF
导出
摘要 针对身份基加密方案效率和安全性不高的问题,利用"双胞胎"技术,提出了一个加密时只需使用一次配对的新方案.研究结果表明,该方案可以在随机预言模型下紧规约到标准难题,是具有适应性选择密文安全的身份基加密方案. This paper presented an efficient and secure identity-based encryption scheme.Compared to the previous scheme,it has the advantage of security or efficiency.This new scheme can achieve adaptive CCA2-security under BDH assumption with tight reduction.The construction was made by use of the "Twin Diffie-Hellman" technique proposed by Cash et al,only requiring one pairing computation during the encryption procedure.
作者 马融 曹珍富
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2010年第3期389-392,共4页 Journal of Shanghai Jiaotong University
基金 国家自然科学基金资助项目(60773086 60972034 60970110)
关键词 身份基加密 紧规约 选择密文安全 随机预言模型 identity-based encryption tight reduction chosen ciphertext security random oracle model
  • 相关文献

参考文献11

  • 1Shamir A. Identity-based cryptosystems and signature schemes[C]//Blakley G R, Chaum D. CRYPTO'84: Lecture Notes in Computer Science. German: Springer, 1984. 被引量:1
  • 2Boneh D, Franklin M K. Identity-based encryption from the weil pairing [C]// Kilian J. CRYPTO'01: Lecture Notes in Computer Science. German: Springer, 2001. 被引量:1
  • 3Waters B. Efficient identity-based encryption without random oracles [C]//Cramer R. EUROCRYPT' 05: Lecture Notes in Computer Science. German: Springer, 2005. 被引量:1
  • 4Gentry C. Practical identity-based encryption without random oracles [C]//EIi B. EUROCRYPT' 06: Lecture Notes in Computer Science. German: Springer, 2005. 被引量:1
  • 5Katz J, Wang N. Efficiency improvements for signature schemes with tight security reductions [C]// Jajodia S, Atluri V, Jaeger T. ACM Conference on Computer and Communications Security. US New York: ACM Press, 2003. 被引量:1
  • 6Attrapadung N, Furukawa J, Gomi T, et al. Efficient identity-based encryption with tight security reduction[C]//Pointcheval D, Mu Y, Chen K. CANS: Lecture Notes in Computer Science. German: Springer, 2006. 被引量:1
  • 7Nishioka M. Identity-based eneryptions with tight security reductions to the BDH problem [J].IEICE Trans Fundamentals, 2008, E91-A(5) : 1241-1252. 被引量:1
  • 8Kitagawa T, Yang P, Hanaoka G, et al. Generic transforms to acquire CCA-seeurity for identity based encryption: The cases of FOpkc and REACT [C]// Batten L M, Safavi-Naini R. ACISP; Lecture Notes in Computer Science. German: Springer, 2006. 被引量:1
  • 9Yang P, Kitagawa T, Hanaoka G, et al. Applying Fujisaki-Okamoto to identity-based encryption [C]// Fossorier M P C, Imai H, Lin S, et al. AAECC: Lecture Notes in Computer Science. German: Springer, 2006. 被引量:1
  • 10Kiltz E, Shoup V. The twin Diffie-Hellman and applications[C]//Smart N P. EURO- 08: Lecture Notes in Computer Science. Springer, 2008. 被引量:1

同被引文献20

  • 1钱海峰,李祥学,郁昱.基于广义切比雪夫多项式的身份基加密体制安全性分析[J].中国通信,2012,1:124-130. 被引量:2
  • 2Ducas L,Lyubashevsky V,Prest T.Efficient Identitybased Encryption over NTRU Lattices[C]//Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security.Berlin,Germany:Springer,2014:22-41. 被引量:1
  • 3Agrawal S,Boneh D,Boyen X.Efficient Lattice(H)IBE in the Standard Model[C]//Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2010:553-572. 被引量:1
  • 4Lyubashevsky V,Prest T.Quadratic Time,Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices[C]//Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2015:789-815. 被引量:1
  • 5Peikert C.Public-key Cryptosystems from the Worst-case Shortest Vector Problem:Extended Abstract[C]//Proceedings of the 41st Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press,2009:333-342. 被引量:1
  • 6Ducas L,Durmus A,Lepoint T,et al.Lattice Signatures and Bimodal Gaussians[C]//Proceedings of the 33rd Annual Cryptology Conference on Lattice Signatures and Bimodal Gaussians.Berlin,Germany:Springer,2015:789-815. 被引量:1
  • 7Hoffstein J,Pipher J,Silverman J H.NTRU:A Ring-based Public Key Cryptosystem[C]//Proceedings of the 3rd International Symposiun on Algorithmic Number Theory.Berlin,Germany:Springer,1998:267-288. 被引量:1
  • 8Hoffstein J,Pipher J,Silverman J H.NSS:An NTRU Lattice-based Signature Scheme[C]//Proceedings of International Conference on the Theory and Application of Cryptographic Techniques.Berlin,Germany:Springer,2001:211-228. 被引量:1
  • 9Lyubashevsky V,Peikert C,Regev O.On Ideal Lattices and Learning with Errors over Rings[J].Journal of the ACM,2013,60(6):1-23. 被引量:1
  • 10Shamir A.Identity-based Cryptosystems and Signature Schemes[C]//Proceedings of CRYPTO’84.Berlin,Germany:Springer,1984:47-53. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部