期刊文献+

标准模型下可证安全的通配符基于身份加密方案 被引量:4

Provably Secure Identity-Based Encryption Scheme with Wildcard in the Standard Model
下载PDF
导出
摘要 针对通配符基于身份加密方案中安全归约不紧密以及运算量大的缺陷,利用双线性对和分级基于身份加密的思想提出标准模型下可证安全的通配符基于身份加密方案.新方案取得紧密的安全归约,同时加密算法不需要对运算,解密算法仅仅需要2个对运算.安全性分析表明,基于改进判定双线性Diffie-Hellman指数假设下。 Based on the bilinear pairings and hierarchical identity-based encryption, an identity-based encryption with wild- card is proposed to overcome the loose security reduction and conaputation inefficiency of the known schemes. Our proposed scheme is provably secure in the standard model which captures fight secure reduction. In our scheme, no pairing computation is needed in the encrypt algorithm and the decrypt algorithm requires only two pairings computations. A security analysis shows that the proposed scheme has the indistinguishability against adaptive chosen ciphertext and identity with wildcard attack under the assumption of De- cision Modify Bilinear Diffie-HeUman Exponent.
作者 明洋 王育民
出处 《电子学报》 EI CAS CSCD 北大核心 2013年第10期2082-2086,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.61202438) 陕西省自然科学基金(No.2010JQ8017) 中国博士后科学基金(No.2011M501427) 西安市科技计划项目(No.CX1258③) 中央高校基本科研业务费专项基金 长安大学基础研究支持计划专项基金(No.CHD2012JC047)
关键词 基于身份加密 标准模型 通配符 双线性对 Identity-based encryption standard model wildcard bilinear pairings
  • 相关文献

参考文献16

  • 1A Shamir. Identity-based cryptosystems and signature schemes [A]. Advances in Cryptology-Crypto 1984[ C]. LNCS 0196, Berlin: Springer-Verlag, 1984.47 - 53. 被引量:1
  • 2D Boneh,M Franldin. Identity-based encryption from the Weil pairing[ A ]. Advances in Cryptology-Crypto 2001 [ C ]. LNCS 2139, Berlin: Springer- Verlag, 2001.213 - 229. 被引量:1
  • 3李大伟,杨庚,朱莉.一种基于身份加密的可验证秘密共享方案[J].电子学报,2010,38(9):2059-2065. 被引量:11
  • 4杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 5M Abdalla, D Catalano, A. W Dent, et al. Identity-based en- eryplion gone wilde [A]. Proceedings of International Colloqui- urn on Automata, Languages and Programming-ICALP 2006 [ C] .LNCS 4052, Berlin: Springer-Verlag,2006. 300 - 311. 被引量:1
  • 6M Abdalla, D Catalano, A W Dent, et al. Identity-Based en- cryption gone wild [ J/OL ]. http://eprint, iaer. org/2006/ 304,2009 - 12 - 20. 被引量:1
  • 7C Gentry, A Silverberg. Hierarchical ID- based cryptography [ A ]. Advances in Cryptology-Asiacrypt 2002 [ C ]. LNCS 2501, Berlin. Springer-Verlag, 2002. 548 - 566. 被引量:1
  • 8D Boneh, X Boyen. Efficient selective-ID secure identity based encryption without random oracles[ A]. Advances in Cryptolo- gy-Eurocrypt 2004 [ C ]. LNCS 3027, Berlin. Springer-Verlag, 2004.223 - 238. 被引量:1
  • 9B Waters. Efficient Identity-based encryption without random oracles[ A ]. Advances in Cryptology-Eurocrypt 2005 [ C ]. LNCS 3494, Berlin: Springer- Verlag, 2005.114 - 127. 被引量:1
  • 10D Boneh,X Boyen,E.-J G-oh.Hierarchical identity based en- cryption with constant size ciphertext[ A]. Advances in Cryp- tology-Eurocaypt 2005[ C ]. LNCS 3494, Berlin. Springer-Ver- lag, 2005.440 - 456. 被引量:1

二级参考文献48

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2Shamir A. Identity-based cryptosystems and signature schemes. Proceedings of Crypto'84, Aug 19-22, 1984, Santa Barbara, CA, USA. LNCS 196. Berlin, Germany: Springer-Verlag, 1985:47-53 被引量:1
  • 3Boneh D, Franklin K. Identity based encryption from the Weil pairing. SIAM Journal on Computing, 2003, 32(3): 586-615 被引量:1
  • 4Abdalla M, Catalano D, Dent A W, et al. Identity-based encryption gone wild. Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06), Jul 9-16, 2006, Venice, Italy. LNCS 4052. Berlin, Germany: Springer-Vedag, 2006:300-311 被引量:1
  • 5Abdalla M, Catalano D, Dent A W, et al. Identity-based encryption gone wild. Full Version Available on Cryptology ePrint Archive. [2007-10-10] http://eprint.iacr.org/2006/304 被引量:1
  • 6Gentry C, Silverberg A. Hierarchical D-based cryptography. Proceedings of Asiacrypt'02, Dec 1-5, 2002, Queenstown, New Zealand. LNCS 2501, Berlin, Germany: Springer-Verlag, 2002:548-566 被引量:1
  • 7Boneh, D, Boyen X. Efficient selective-ID secure identity based encryption without random oracles. Proceedings of Eurocrypt'04, May 2-6, 2004, Interlaken, Switzerland. LNCS 3027, Berlin, Germany: Springer-Verlag, 2004:223-238 被引量:1
  • 8Waters B. Efficient identity-based encryption without random oracles. Proceedings of Eurocrypt'05, May 22-26, 2005, Aarhus, Denmark. LNCS 3494, Berlin, Germany: Springer-Verlag, 2005:114--127 被引量:1
  • 9Boneh D, Boyen X, Goh E J. Hierarchical identity based encryption with constant size ciphertext. Proceedings of Eurocrypt'05, May 22-26, 2005, Aarhus, Denmark. LNCS 3494. Berlin, Germany: Springer-Verlag, 2005: 440-456 被引量:1
  • 10Chatterjee S, Sarkar P. HIBE with short public parameters without random oracle. Proceedings of Asiacrypt'06, Dec 3-7, 2006, Shanghai, China. LNCS 4284. Berlin, Germany: Springer-Verlag, 2006:145-160 被引量:1

共引文献71

同被引文献33

  • 1王圣宝,曹珍富,董晓蕾.标准模型下可证安全的身份基认证密钥协商协议[J].计算机学报,2007,30(10):1842-1852. 被引量:42
  • 2Samir A. Identity-based cryptosystems and signatureschemes [A ]. Advances in Cryptology-Crypto ( LNCS 0196) [C ]. Berlin: Springer-Verlag, 1984.47 - 53. 被引量:1
  • 3Boneh D, Franklin M. Identity-based encryption from the Weil pairing [ A ]. Advances in Cryptology-Crypto ( LNCS 2139) [ C]. Berlin: Springer-Vedag ,2001,213 - 229. 被引量:1
  • 4A1-Riyami S S, Paterson K G. Certificateless public key cryptography [ A ]. Advances in Cryptology-ASIACRYPT (LNCS 2894 ) [ C]. Berlin: Springer-Verlag, 2003. 452 - 473. 被引量:1
  • 5Gentry C. Certificate-based encryption and the certificate Revocation problem [ A ]. Advances in Cryptology-EURO- CRYPT ( LNCS 2656 ) I C ]. Berlin: Springer-Verlag, 2003. 272 - 293. 被引量:1
  • 6Kate A, Goldberg I. A Distributed Private-Key Generator for Identity-Based Cryptography[ R ]. Centre for AppliedCryptographic Research ( CACR 2007 - 33 ). 2007. 被引量:1
  • 7Chen L, Harrison K, Soldera D, Smart N P. Applications of multiple trust authorities in pairing based cryptosystems [ A ]. Proceedings of the International Conference on Infra- structure Security ( LNCS 2637 ) [ C ]. Berlin: Springer-Ver- lag, 2003. 260 - 275. 被引量:1
  • 8Wang J, Bai X, Yu J, Li D. Protecting against key escrow and key exposure in identity-based cryptosystem [ A ]. Pro- ceedings of the 4th International Conference on Theory and Applications of Models of Computation-TAMC (LNCS 4484 ) [ C ]. Berlin: Springer-Vedag, 2007,148 - 158. 被引量:1
  • 9Lee B, Boyd C, Dawson E, Kim K, Yang J, Yoo S. Secure key issuing in ID-based cryptography [ A ]. Proceexlings of Australasian Information Security Workshop-AISW [ C ]. Dunedin, New Zealand: IEEE Press,2004.69 - 74. 被引量:1
  • 10Lewko A B, Waters B. Why proving HIBE systems secure is difficult [ A ]. Advances in Cryptology-EUROCRYPT ( LNCS 8441 ) [ C ]. Berlin: Springer-Verlag, 2014. 58 -76. 被引量:1

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部