期刊文献+

抗密钥泄露的在线/离线身份基加密机制 被引量:2

Identity-based online/offline encryption resistant to key leakage
下载PDF
导出
摘要 目前已有的在线/离线身份基加密(IBOOE)方案无法抵抗边信道攻击,可能会引起密码系统秘密信息泄露问题。新方案通过将随机提取器嵌入在线加密算法来隐藏私钥泄露和密文之间的关系,提出首个有界泄露模型下安全的IBOOE方案;新方案基于合数阶双线性群上的三个静态假设,利用双系统加密技术在标准模型下抵抗选择明文攻击达到完全安全性和泄露弹性。此外,与传统的IBOOE方案相比较,新方案特别适用于敏感数据存储且资源受限的场景。 The exist identity-based online/offline encryption( IBOOE) systems can’t resilient to side channel attack,it will lead to secret information leakage problem of cryptosystem. This paper embedded random extractor to online encryption procedure to mask the relationship between the leakage of secret key and the ciphertext. It firstly put forward a bound leakage IBOOE scheme. The proposed scheme employed dual system encryption to prove fully security and chosen plaintext security against key leakage attacks in the standard model from three static assumptions on composite order bilinear groups. In addition,compared with the traditional IBOOE scheme,the proposed scheme is extremely suitable for the scenarios where store sensitive data and resource-constrained.
作者 张秀洁 Zhang Xiujie(School of Computer Engineering,Weifang University,Weifang Shandong 261061,China)
出处 《计算机应用研究》 CSCD 北大核心 2020年第6期1816-1820,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61802249) 省部级学科平台开放课题资助项目(szjj2015-054) 山东省高等学校科技发展计划资助项目(J16LN56) 潍坊市科技发展计划资助项目(2017GX002) 潍坊学院2015年博士科研基金资助项目(2015BS11)。
关键词 基于身份加密 在线/离线 泄露弹性 双系统加密 可证明安全 identity-based encryption online/offline leakage resilient dual system encryption provable security
  • 相关文献

参考文献1

二级参考文献15

  • 1SHAMIR A. Identity - based cryptosystems and signature schemes [ C]// Advances in Cryptology-CRYPTO' 8g, LNCS 196. Berlin: Springer-Verlag, 1984:47-53. 被引量:1
  • 2BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[J[. SIAM Journal of Computing, 2001, 32(3) : 586 -615. 被引量:1
  • 3COCKS C. An identity based encryption scheme based on quadratic residues[ C[//Proceedings of the 8th IMA International Conference on Cryptography and Coding, LNCS 2260. Berlin: Springer-Verlag, 2001: 360-363. 被引量:1
  • 4GALINDO D. Boneh-Franklin identity based encryption revisited [ C[//Proceedings of the 32nd International Colloquium on Autom- ata, Languages and Programming, LNCS 3580. Berlin: Springer- Verlag, 2005:791-802. 被引量:1
  • 5BONEH D, BOYEN X. Efficient selective-ID secure identity based encryption without random oracles [ C]// Proceedings of the Ad- vances in Cryptology-Eurocrypt'04. Berlin: Springer-Verlag, 2004: 223 - 238. 被引量:1
  • 6WATERS B. Effieient identity-based eneryption without random ora- cles[ C]//Proceedings of the Advances in Cryptology-Euroerypt' 05. Berlin: Springer-Verlag, 2005:114 - 127. 被引量:1
  • 7WATERS B. Dual system eneryption: realizing fully seeure IBE and HIBE under simple assumptions[ C]//Proeeodings of the Advanees in Cryptnlogy-CRYPTO 2009. Berlin: Springer-Verlag, 2009:619 - 636. 被引量:1
  • 8CHATrERJEE S, SARKAR P. Trading time for space: towards an efficient IBE scheme with short(er) public parameters in the stand- ard model[ C]// Proeeedings of the 2005 Information Security and Cryptology. Berlin: Springer-Verlag, 2005:424-440. 被引量:1
  • 9NACCACHE D. Secure and practical identity-based eneryption[ J]. lET Information Security, 2007, 1(2) : 59-64. 被引量:1
  • 10ATYRAPADUNG N, FURUKAWA J, GOMI T, et al. Efficient i- dentity-based encryption with tight security reduction [ J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007, 90-A(9) : 1803 - 1813. 被引量:1

共引文献5

同被引文献20

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部