全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2013 

标准模型下CCA2安全且固定密文长度的模糊基于身份加密方案

DOI: 10.3969/j.issn.0372-2112.2013.10.012, PP. 1948-1952

Keywords: 模糊基于身份加密,适应性选择密文攻击,双线性对,标准模型

Full-Text   Cite this paper   Add to My Lib

Abstract:

模糊基于身份加密体制为基于身份密码提供了检错能力,并且可以把消息加密后同时发送给多个具有相同属性的用户.本文提出了一种在标准模型下能抵抗适应性选择密文攻击,并且密文长度达到了固定值的模糊基于身份加密方案.与现有方案相比,本方案占用通信带宽低,计算效率高,具有更高的安全性,因此能更好的满足应用要求.

References

[1]  Boneh D,Franklin M.Identity-based encryption from the weil pairing [A].Proceedings of the CRYPTO 2001 [C].LNCS 2139.Berlin:Springer-Verlag,2001.213-229.
[2]  Sahai A,Waters B.Fuzzy identity-based encryption [A].Proceedings of the EUROCRYPT 2005 [C].LNCS 3494.Berlin:Springer-Verlag,2005.166-180.
[3]  袁春,文振,张基宏,钟玉琢.基于密码学的访问控制和加密安全数据库[J].电子学报,2006,:2043-2046. Yuan Chun,et al.Progress of cryptographic access control and encryption security database[J].Acta Electronica Sinica,2006,34(11):2043-2046.(in Chinese)
[4]  Baek J,Susilo W,Zhou J.New constructions of fuzzy identity-based encryption [A].Proceedings of the ACM Symposium on Information Computer and Communication Security 2007 [C].New York:ACM,2007.368-370.
[5]  Yang Y,Hu Y,Zhang L,Sun C.CCA2 secure biometric identity based encryption with constant-size ciphertext[J].Journal of Zhejiang University-Science C (Computers & Electronics),2011,12(10):819-827.
[6]  Tian M,Yang W,Huang L.Security of a biometric identity-based encryption scheme [J/OL].http://arxiv.org/abs/1110.2653v2,2013-01-24.
[7]  Tian M,Huang L,Yang W.Secruity analysis of a fuzzy identity-based encryption scheme [J/OL].http://eprint.iacr.org/2011/523,2013-01-24.
[8]  Shamir A.Identity-based cryptosystems and signature schemes [A].Proceedings of the CRYPTO 1984 [C].LNCS 196.Berlin:Springer-Verlag,1984.47-53.
[9]  杨庚,等.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35 (1):180-184. Yang Gong,et al.A key establish scheme for WSN based on IBE and Diffie-Hellman algorithms[J].Acta Electronica Sinica,2007,35 (1):180-184.(in Chinese)
[10]  Ren Y,et al.New fuzzy identity-based encryption in the standard model[J].Informatica,2010,21(3):393-4074.
[11]  Sarier N.A new biometric identity based encryption scheme secure against DoS attacks[J].Security and Communication Networks,2011,4(1):23-32.
[12]  Canetti R,et al.The random oracle methodology revisited[J].Journal of the ACM,2004,51(4):557-594.
[13]  Boneh D,Boyen X,Goh E.Hierarchical identity based encryption with constant size ciphertext [A].Proceedings of the EUROCRYPT 2005 [C].LNCS 3494.Berlin:Springer-Verlag,2005:166-180.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133