期刊文献+

抗密钥泄漏的基于身份的加密方案 被引量:1

Identity-based Encryption Scheme Resilient to Key Leakage
下载PDF
导出
摘要 近期,由于冷启动和边信道等多种新型密码攻击破坏了原有方案的安全性,设计出抗泄漏的密码学方案就成了一个迫切需要解决的问题。设计了一个抗泄漏的基于身份的加密方案,在平方判定性双线性Diffie-Hellman困难问题假设的基础上证明了方案的安全性,并且可以获得较短的公钥长度。另外通过具体抗泄漏性能分析可以得到系统能容忍的密钥泄漏量可以接近密钥长度的一半,即相对泄漏率接近于1/2。 Recently, in the community of leakage-resilient cryptography research, leakage-resilient identity- based encryption causes a great deal of concern. A leakage-resilient identity-based encryption scheme is presented. On the judgment of square bilinear Diffie-Hellman problem(Square-DBDH) , the proof of the security of the scheme is given in a tight reduction way. The proposed scheme has shorter public key parameters. The specific analysis shows that our scheme can almost tolerate half leakage of the secret key, i.e. the relative rate is close to 1/2.
出处 《科学技术与工程》 北大核心 2013年第28期8310-8314,共5页 Science Technology and Engineering
基金 国家自然科学基金(61272542)资助
关键词 基于身份的加密 抗泄漏 相对泄漏率 双线性映射 最小熵 identity-based encryption leakage-resilient relative leakage rate bilinear maprain-entropy
  • 相关文献

参考文献18

  • 1Halderman J A, Schoen S D, Heninger N, et al. Lest we remember: cold-boot attacks on encryption keys. Communications of the ACM, 2009, 52(5): 91--98. 被引量:1
  • 2Boneh D, Brumley D. Remote timing attacks are practical. Computer Networks, 2005 , 48 ( 5 ) :701--716. 被引量:1
  • 3Kocher P, Jaffe J, Jun B. Differential power analysis. 19th Annual International Cryptology Conferenee, Berlin Heidelberg: Springer, 1999 : 388--397. 被引量:1
  • 4Boneh D, DeMillo R A, Lipton R J. On the importance of checking cryptographic protocols for faults. 1997 Proceedings of International Conference on the Theory and Application of Cryptographic Tech- niques, Berlin Heidelberg: Springer, 1997:37--51. 被引量:1
  • 5Gandolfi K, Mourtel C, Olivier F. Electromagnetic analysis: Con- crete results. Cryptographic Hardware and Embedded Systems, Berlin Heidelberg: Springer, 2001:251--261. 被引量:1
  • 6Biham E, Shamir A. Differential fault analysis of secret key crypto- systems. 17th Annual International Cryptology Conference, Berlin Heidelberg: Springer, 1997:513--525. 被引量:1
  • 7Akavia A, Goldwasser S, Vaikuntanathan V. Simuhaneous hardcore bits and cryptography against memory attacks. 6th Theory of Cryptog- raphy Conference, Berlin Heidelberg: Springer, 2009:474---495. 被引量:1
  • 8Naor M, Segev G. Public-key cryptosystems resilient to key leak- age. 29th Annual international Cryptology Conference, Berlin Heidel- berg : Springer, 2009 : 18--35. 被引量:1
  • 9Dodis Y, Haralambiev K, L6pez--Alt A, et al. Efficient public-key cryptography in the presence of key leakage. 16th International Con- ference on the Theory and Application of Cryptology and Information Security, Berlin Heidelberg: Springer, 2010:613--631. 被引量:1
  • 10Katz J, Vaikuntanathan V. Signature schemes with bounded leakageresilience. 15th International Conference on the Theory and Applica- tion of Cryptology and Information Security, Berlin Heidelberg: Springer, 2009:703--720. 被引量:1

同被引文献8

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部