期刊文献+

标准模型下高效的基于身份匿名广播加密方案 被引量:1

Efficient identity-based anonymous broadcast encryption scheme in standard model
下载PDF
导出
摘要 针对现实中广播加密的安全问题,提出一种标准模型下高效的基于身份匿名广播加密方案。匿名广播加密中广播者加密数据通过广播信道发送给用户,其中只有授权用户能够解密获得数据,同时任何人不能分辨出加密数据是发送给哪个用户的,从而保护了接收者用户的隐私。所提方案利用双系统加密技术,基于合数阶双线性群提出。同时,该方案基于静态假设,在标准模型中证明方案是选择明文安全的,密文和密钥取得了固定长度。和对比方案相比,所提方案密钥长度仅需2个群元素,同时方案满足匿名性。 Concerning the broadcast encryption security problem in reality, a new identity-based anonymous broadcast encryption scheme in the standard model was proposed. In a anonymous broadcast encryption scheme, broadcaster sent encrypted data to the user via a broadcast channel, which only authorized users could decrypt and access the data; meanwhile, no one knew whom the encrypted data was sent to. Thereby the recipient user's privacy was protected. The scheme was proposed by combining with dual system encryption and composite-order bilinear groups. Based on static assumptions, the proposed scheme is chosen plaintext secure in the standard model, the ciphertext and private key in the scheme has fix length. Compared with the contrast scheme, the length of key is only two group elements, and the proposed scheme can satisfy the anonymity.
出处 《计算机应用》 CSCD 北大核心 2016年第10期2762-2766,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61202438) 陕西省工业科技攻关项目(2015GY014) 西安市科技计划项目(CXY1437(10))~~
关键词 标准模型 广播加密 双系统加密 静态假设 双线性对 standard model broadcast encryption dual system encryption static assumption bilinear pairing
  • 相关文献

参考文献21

  • 1FIAT A, NAOR M. Broadcast encryption [ C]// CRYPTO 1993: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer, 1993:480-491. 被引量:1
  • 2DODIS Y, FAZIO N. Public key broadcast encryption secure against adaptive chosen ciphertext attacks [ C]//Proceedings of the 6th In- ternational Workshop on Practice and Theory in Public Key Cryptog- raphy. Berlin: Springer, 2003: 100-115. 被引量:1
  • 3BONEH D, GENTRY C, WATERS B. Collusion resistant broadcast encryption with short eiphertexts and private keys [ C]// CRYPTO 2005: Proceedings of the 25th Annual International Cryptology Con- ference on Advances in Cryptology, LNCS 3621. Berlin: Springer, 2005:258 - 275. 被引量:1
  • 4DELERABLIE C, PAILLIER P, POINTCHEVAL D. Fully collu- sion secure dynamic broadcast eneryption with constant size cipher-texts or decryption keys [ C]// Proceedings of the 1 st International Conference on Pairing-Based Cryptography, LNCS 4575. Berlin: Springer, 2007:39-59. 被引量:1
  • 5SUN J, HU Y, ZHANG L. A key-policy attribute-based broadcast encryption [ J]. International Arab Journal of Information Technolo- gy, 2013, 10(5): 444-452. 被引量:1
  • 6SHAMIR A. Identity-based cryptosystems and signature schemes [ C]// Proceedings of CRYPTO 1984 on Advances in Cryptology, LNCS 196. Berlin: Springer, 1984:47-53. 被引量:1
  • 7DELERABLE C. Identity-based broadcast encryption with constant size ciphertexts and private keys [ C] // Proceedings of the 13th In- ternational Conference on the Theory and Application of Cryptology and Information Security on Advances in Cryptology, LNCS 4833. Berlin: Springer, 2007:200-215. 被引量:1
  • 8GENTRY C, WATERS B. Adaptive security in broadcast eneryption systems [ EB/OL]. [ 2015-11- 23]. http://eprint, iaer. org/2008/ 268. pdf. 被引量:1
  • 9REN Y, GU D. Fully CCA2 secure identity based broadcast eneryp- tion without random oracles [ J]. Information Processing Letters, 2009, 109(11): 527-533. 被引量:1
  • 10LEWKO A, WATERS B. New techniques for dual system encryp- tion and fully secure HIBE with short ciphertexts [ C]// TCC2010: Proceedings of the 7th International Conference on Theory of Cryptography. Berlin: Springer, 2010:455-479. 被引量:1

二级参考文献13

  • 1Fiat A,Naor M. Broadcast Encryption[A].Berlin,Germany:Springer,1993.480-491. 被引量:1
  • 2Shamir A. Identity-based Cryptosystems and Signature Sche-mes[A].Berlin,Germany:Springer,1985.47-53. 被引量:1
  • 3Delerablée C. Identity-based Broadcast Encryption with Con-stant Size Ciphertexts and Private Keys[A].Berlin,Germany:Springer,2007.200-215. 被引量:1
  • 4Boneh D,Gentry C,Waters B. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys[A].Berlin,Germany:Springer,2005.258-275. 被引量:1
  • 5Zhang Leyou,Hu Yupu,Wu Qing. New Constructions of Identity-based Broadcast Encryption Without Random Oracles[J].KSII Transactions on Internet and Information Systems,2011,(02):428-439. 被引量:1
  • 6Gentry C,Waters B. Adaptive Security in Broadcast Encryption Systems(with Short Ciphertexts)[A].Berlin,Germany:Springer,2009.171-188. 被引量:1
  • 7Zhang Leyou,Hu Yupu,Wu Qing. Adaptively Secure Identity-based Broadcast Encryption with Constant Size Private Keys and Ciphertexts from the Subgroups[J].Mathematical and Computer Modelling,2012,(01):12-18. 被引量:1
  • 8Bellare M,Boldyreva A,Desai A. Key-privacy in Public-key Encryption[A].Berlin,Germany:Springer,2001.566-582. 被引量:1
  • 9Lewko A,Waters B. New Techniques for Dual System Encry-ption and Fully Secure HIBE with Short Ciphertexts[A].Berlin,Germany:Springer,2010.455-479. 被引量:1
  • 10Zhang Leyou,Hu Yupu,Wu Qing. Fully Secure Identity-based Broadcast Encryption in the Subgroups[J].China Communications,2011,(02):152-158. 被引量:1

共引文献2

同被引文献11

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部