期刊文献+

标准模型下抗泄漏的IBE

A LEAKAGE-RESILIENT IDENTITY-BASED ENCRYPTION SCHEME IN STANDARD MODEL
下载PDF
导出
摘要 由于边信道和冷启动攻击的存在,以黑盒模型为基础的可证安全密码系统的密钥等机密信息会有泄漏,这就会导致密码方案的安全性受到破坏。针对这样的问题,提出一个标准模型下的基于身份的抗泄漏的加密方案。首先,给出抗泄漏的基于身份的加密方案的具体构造;接着,从理论上证明该方案的安全性和抗泄漏性能。方案的安全性是基于q-ABDHE假设运用线性无关的思想证明得到的,方案的抗泄漏性是通过提取器的合理使用得到的。该方案是针对选择密文攻击抗泄漏安全的,理论分析表明该方案的私钥相对泄漏率可以接近1/6。 The existence of side channel attacks and cold boot attack may leak the confidential information of black box-based key of provably secure cryptographic systems. In this case, the safety of the cryptographic schemes could be destroyed. In view of this, we put forward a leakage-resilient identity-based encryption scheme in standard model. First, we gave the specific construction of our scheme. Then we proved theoreticallythe security and leakage-resilience performance of the proposed scheme. The security of the scheme was derived from the proof based on q-ABDHE hypothesis and used the idea of linearly independence, and the property of leakage resilience was obtained by reasonable use of an extractor. The proposed scheme is fully secure against the chosen ciphertext attack with leakage resilience. Theoretical analysis showed that the relative leakage ratio of the scheme was almost up to 1/6 for private key.
作者 李云 张永平
出处 《计算机应用与软件》 CSCD 2016年第1期316-320,329,共6页 Computer Applications and Software
基金 江苏省教育厅自然科学基金项目(14K JD520006)
关键词 基于身份加密 抗泄漏 提取器 标准模型 双线性映射 q-ABDHE假设 Identity-based encryption Leakage-resilient Extractor Standard model Bilinear map Q-ABDHE hypothesis
  • 相关文献

参考文献20

  • 1Shamir A.Identity-based cryptosystems and signature schemes[C]//Proceedings of CRYPTO 84,August 19-22,1984,University of California,Santa Barbara,USA.Berlin:Springer,1985:47-53. 被引量:1
  • 2Boneh D,Franklin M.Identity-based encryption from the Weil pairing[C]//The 21st Annual International Cryptology Conference,August19-23,2001,Santa Barbara,California,USA.Berlin:Springer,2001:213-229. 被引量:1
  • 3Boneh D,Boyen X.Efficient selective-ID secure identity-based encryption without random oracles[C]//International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT2004),May 2-6,2004,Interlaken,Switzerland.Berlin:Springer,2004:223-238. 被引量:1
  • 4Gentry C.Practical identity-based encryption without random oracles[C]//The 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques,May 28-June 1,2006,St.Petersburg,Russia.Berlin:Springer,2006:445-464. 被引量:1
  • 5Waters B.Efficient identity-based encryption without random oracles[C]//The 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques,May 22-26,2005,Aarhus,Denmark.Berlin:Springer,2005:114-127. 被引量:1
  • 6Bellare M,Waters B,Yilek S.Identity-based encryption secure against selective opening attack[C]//The 8th Theory of Cryptography Conference,March 28-30,2011,Providence,RI,USA.Berlin:Springer,2011:235-252. 被引量:1
  • 7Alperin Sheriff J,Peikert C.Circular and KDM security for identitybased encryption[C]//The 15th International Conference on Practice and Theory in Public Key Cryptography,May 21-23,2012,Darmstadt,Germany.Berlin:Springer,2012:334-352. 被引量:1
  • 8Kim T,Ma J,Fang W,et al.Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption[C]//International Conferences,EL,DTA and UNESST 2012,December 16-19,2012,Gangneug,Korea.Berlin:Springer,2012:99-102. 被引量:1
  • 9Xiong H,Yuen T H,Zhang C,et al.Attribute Specified Identity-Based Encryption[C]//The 9th International Conference on Information Security Practice and Experience(ISPEC 2013),May 12-14,2013,Lanzhou,China.Berlin:Springer,2013:60-74. 被引量:1
  • 10Halderman J A,Schoen S D,Heninger N,et al.Lest we remember:cold-boot attacks on encryption keys[J].Communications of the ACM,2009,52(5):91-98. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部