全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2013 

标准模型下可证安全的通配符基于身份加密方案

DOI: 10.3969/j.issn.0372-2112.2013.10.32, PP. 2082-2086

Keywords: 基于身份加密,标准模型,通配符,双线性对

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对通配符基于身份加密方案中安全归约不紧密以及运算量大的缺陷,利用双线性对和分级基于身份加密的思想提出标准模型下可证安全的通配符基于身份加密方案.新方案取得紧密的安全归约,同时加密算法不需要对运算,解密算法仅仅需要2个对运算.安全性分析表明,基于改进判定双线性Diffie-Hellman指数假设下,所提方案在适应性选择密文和通配符身份攻击下满足不可区分性.

References

[1]  李大伟,杨庚,朱莉.一种基于身份加密的可验证秘密共享方案[J].电子学报,2010,38(9):2059-2065. LI Da-wei,YANG Geng,ZHU Li.An ID based verifieable secret sharing scheme[J].Acta Electronica Sinica,2010,38(9):2059-2065.(in Chinese)
[2]  C Gentry,A Silverberg.Hierarchical ID-based cryptography [A].Advances in Cryptology-Asiacrypt 2002 [C].LNCS 2501,Berlin.Springer-Verlag,2002.548-566.
[3]  B Waters.Efficient Identity-based encryption without random oracles [A].Advances in Cryptology-Eurocrypt 2005 [C].LNCS 3494,Berlin:Springer-Verlag,2005.114-127.
[4]  S Chatterjee,P Sarkar.HIBE with short public parameters without random oracle [A].Advances in Cryptology-Asiacrypt 2006 [C].LNCS 4284,Berlin.Springer-Verlag,2006.145-160.
[5]  J Birkett,A.W Dent,G Neven,et al.Efficient chosen-ciphertext secure identity-based encryption with wildcards [A].Proceedings of Australasian Conference on Information Security and Privacy-ACISP 2007 [C].LNCS 4586,Berlin.Springer-Verlag,2007.274-292.
[6]  R Canetti,S Halevi,J Kate.A forward-secure public key encryption scheme [A].Advances in Cryptology-Eurocrypt 2003 [C].LNCS 2656,Berlin.Springer-Verlag,2003.255-271.
[7]  A Shamir.Identity-based cryptosystems and signature schemes [A].Advances in Cryptology-Crypto 1984 [C].LNCS 0196,Berlin:Springer-Verlag,1984.47-53.
[8]  D Boneh,M Franklin.Identity-based encryption from the Weil pairing [A].Advances in Cryptology-Crypto 2001 [C].LNCS 2139,Berlin:Springer-Verlag,2001.213-229.
[9]  杨庚,等.基于身份加密的无线传感器网络密钥分配方法 [J].电子学报,2007,35(1):180-184. YANG Geng,et al.A key establish scheme for WSN based on IBE and Diffie-Hellman algorithms[J].Acta Electronica Sinica,2007,35(1):180-184.(in Chinese)
[10]  M Abdalla,D Catalano,A.W Dent,et al.Identity-based encryption gone wild [A].Proceedings of International Colloquium on Automata,Languages and Programming-ICALP 2006 [C].LNCS 4052,Berlin:Springer-Verlag,2006.300-311.
[11]  M Abdalla,D Catalano,A W Dent,et al.Identity-Based encryption gone wild [J/OL].http://eprint.iacr.org/2006/304,2009-12-20.
[12]  D Boneh,X Boyen.Efficient selective-ID secure identity based encryption without random oracles [A].Advances in Cryptology-Eurocrypt 2004 [C].LNCS 3027,Berlin.Springer-Verlag,2004.223-238.
[13]  D Boneh,X Boyen,E.-J Goh.Hierarchical identity based encryption with constant size ciphertext [A].Advances in Cryptology-Eurocrypt 2005 [C].LNCS 3494,Berlin.Springer-Verlag,2005.440-456.
[14]  REN Yan-li,GU Da-wu.Secure hierarchical identity based encryption scheme in the standard model [A].Progress in Cryptology-INDOCRYPT 2008 [C].LNCS 5365,Berlin.Springer-Verlag,2008.104-115.
[15]  MING Yang,SHEN Xiao-qin,WANG Yu-min.Identity-based encryption with wildcards in the standard model[J].The Jounal of China Universities of Posts and Telecommunications,2009,16(1):64-68.
[16]  C Gentry.Practical identity-based encryption without random oracles [A].Advances in Cryptology-Eurocrypt 2006 [C].LNCS 4004,Berlin.Springer-Verlag,2006.445-464.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133