期刊文献+

不可信更新的前向安全公钥加密方案:安全性模型和构造

Forward-secure public-key encryption scheme with untrusted update: security model and constructions
下载PDF
导出
摘要 已提出的不可信更新的前向安全公钥加密方案没有安全性证明,因此对方案的安全性存在质疑。对前向安全公钥加密方案进行扩展,给出具有可证明安全的不可信更新前向安全公钥加密方案,提出了不可信更新的前向安全公钥加密的方案定义和形式化安全性模型。根据方案定义,运用双线性映射技术以及高效的对称加密机制,提出一个不可信更新的前向安全公钥加密方案,并在随机预言机模型下证明了该方案的安全性。通过分析,该方案具有定长密文、定长私钥、固定加/解密开销、固定密钥更新开销的特点,具有一定的实用性。 The proposed forward-secure public-key encryption scheme with untrusted update has no provable security, so there is doubt about the security of the proposed schemes. This paper extended the forward-secure public-key encryption scheme and proposed the provable secure forward-secure public-key eneryption scheme with untrusted update. It presented the definition of forward-secure public-key encryption scheme with untrusted update. According to the definition of scheme, it proposed the for- ward-secure public-key encryption scheme with untrusted update using bilinear mapping and efficient symmetric encryption scheme, and proved the security of the scheme based on random oracle. Through analysis, the proposed scheme is practicality as it has constant size ciphertext, constant size of private key, constant overhead of encryption and decryption algorithms, con- stant overhead of key update algorithm.
出处 《计算机应用研究》 CSCD 北大核心 2016年第8期2420-2424,共5页 Application Research of Computers
基金 省部级学科平台开放课题资助项目(szjj2015-054) 潍坊学院2015年博士科研基金资助项目(2015BS11)
关键词 前向安全 密钥泄露 公钥加密 可证明安全 不可信更新 forward-secure key leakage public-key encryption improved security untrasted update
  • 相关文献

参考文献16

  • 1Ginther C. G. An identity-based key-exchange protocol[ C ]//Proc of Advances in Cryptology-EUROCRYPT. 1990:29-37. 被引量:1
  • 2Diffie W, Van Oorschot P, Wiener W. Authentication and authenti- cated key exchanges [ J ]. Designs, Codes and Cryptography, 1992,2(2) :107-125. 被引量:1
  • 3Bellare M, Miner S. A forward-secure digital signature scheme [ C ]// Advances in Cryptology-CRYPTO. Berlin : Springer, 1999:431 - 448. 被引量:1
  • 4Abdalla M, Reyzin L. A new forward-secure digital signature scheme [ C ]//'Advances in Cryptology-ASIACRYPT. Berlin : Springer, 2000 : 116-129. 被引量:1
  • 5Krawezyk H. Simple forward-secure signatures from any signature scheme [ C ]//Proc of the 7 th ACM Conference on Computer and Com- munication Security. 2000 : 108-115. 被引量:1
  • 6Itkis G, Reyzin L. Forward-secure signatures with optimal signing and verifying [ C ]//Advances in Cryptology-CRYPTO. Berlin : Springer, 2001:332-354. 被引量:1
  • 7Malkin T, Micciancio D, Miner S. Efficient generic forward-secure signatures with an unbounded number of time periods[ C ]//Advances in Cryptology-EUROCRYPT. Berlin: Springer,2002:400- 417. 被引量:1
  • 8Canetti R, Halevi S, Katz J. A forward-secure public-key encryption scheme [ C ]//Advances in Cryptology-EUROCRYPT. Berlin : Spring- er,2003:255-271. 被引量:1
  • 9Yao Danfeng, Dodis Y, Fazio N, et al. ID-based encryption for com- plex hierarchies with applications to forward security and broadcast en- cryption[ C ]//Proc of the llth ACM Conference on Computer and Communication Security. 2004:354-363. 被引量:1
  • 10Yu Jia, Kong Fanyu, Cheng Xiangguo, et al. Forward-secure identity- based public-key encryption without random oracles[ J]. Fundamen- ta Informaticae,2011,111 (2) : 1 - 16. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部