摘要
提出一个非交互的基于身份的门限加密方案,该方案在随机预言器模型下可证明是CCA安全的.首先利用一个简单的提高安全性的方法,得到一个将一般的基于身份加密方案的安全性从CPA提高至CCA的通用方法,接着运用该转化方法,构造了一个CCA安全的基于身份的门限加密方案实例且密文的传输效率较之前的方法有大幅提高.
In this paper,a non-interactive threshold encryption scheme has been presented based on identity in order to prove the scheme of CCA-secure in the random oracle model.First,a simple conversion has been used to get a general method which improves the security of an identity-based encryption from CPA to CCA,then in the method,a CCA-secure identity-based threshold encryption scheme has been constructed.In the existing literature,there are few CCA-secure threshold schemes,in order to improve the security from CPA to CCA,some approaches existing need to add an one-time signature additionally for each encryption and the length of transmitting ciphertext will be increased(ciphertext has two more parts:verification key and signature).However,in the construction of this paper,the transmission efficiency is at least twice than that of previous methods.
引文
[1] SHAMIR A.How to Share a Secret[J].Communication of the ACM,1979,22(11):612-613.
[2] DESMEDT Y.Society and Group Oriented Cryptography:a New Concept[J].Cryptography,1987,20(5):739-760.
[3] DESMEDT Y,FRANKEL Y.Threshold cryptosystems[C]//On Advances in Cryptology.New York:Springer-Verlag,1989.
[4] SHOUP V,GENNARO R.Securing Threshold Cryptosystems Against Chosen Ciphertext Attack[C]//International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,1998.
[5] BONEH D,BOYEN X,HALEVI S.Chosen Ciphertext Secure Public Key Threshold Encryption without Random Oracles[C]//Cryptographers Track at the RSA Conference on Topics in Cryptology.New York:Springer-Verlag,2006:226-243.
[6] BONEH D,FRANKLIN M.Identity Based Encryption from the Weil Pairing[J].IEEE Trans on Wireless Commun,2003,32(3):213-229.
[7] BONEH D,CANETTI R,HALEVI S,et al.Chosen-Ciphertext Security from Identity-Based Encryption[C]//Proceedings of Eurocrypt 2004.New York:Springer-Verlag,2004:207-222.
[8] BONEH D,BOYEN X.Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles[J].Proceedings of Eurocrypt,2004,2004(4):172.
[9] FUJISAKI E,OKAMOTO T.How to Enhance the Security of Public-Key Encryption at Minimum Cost[C]//International Workshop on Public Key Cryptography.Berlin:Springer,1999:53-68.
[10]李帅丽,郑严,包小敏.基于双线性对与身份的数字签名方案研究[J].西南大学学报(自然科学版),2009,31(5):71-74.