用户名: 密码: 验证码:
一个CCA安全的基于身份的门限加密方案
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:A CCA-Secure Identity-Based Threshold Encryption
  • 作者:董梦景 ; 包小敏
  • 英文作者:DONG Meng-jing;BAO Xiao-min;School of Mathematics and Statistics,Southwest University;
  • 关键词:基于身份加密 ; 门限方案 ; BDH假设 ; 选择密文攻击安全
  • 英文关键词:identity-based encryption;;threshold scheme;;BDH assumption;;secure against chosen cipher-text attack
  • 中文刊名:西南师范大学学报(自然科学版)
  • 英文刊名:Journal of Southwest China Normal University(Natural Science Edition)
  • 机构:西南大学数学与统计学院;
  • 出版日期:2019-01-20
  • 出版单位:西南师范大学学报(自然科学版)
  • 年:2019
  • 期:01
  • 语种:中文;
  • 页:90-94
  • 页数:5
  • CN:50-1045/N
  • ISSN:1000-5471
  • 分类号:TN918.4
摘要
提出一个非交互的基于身份的门限加密方案,该方案在随机预言器模型下可证明是CCA安全的.首先利用一个简单的提高安全性的方法,得到一个将一般的基于身份加密方案的安全性从CPA提高至CCA的通用方法,接着运用该转化方法,构造了一个CCA安全的基于身份的门限加密方案实例且密文的传输效率较之前的方法有大幅提高.
        In this paper,a non-interactive threshold encryption scheme has been presented based on identity in order to prove the scheme of CCA-secure in the random oracle model.First,a simple conversion has been used to get a general method which improves the security of an identity-based encryption from CPA to CCA,then in the method,a CCA-secure identity-based threshold encryption scheme has been constructed.In the existing literature,there are few CCA-secure threshold schemes,in order to improve the security from CPA to CCA,some approaches existing need to add an one-time signature additionally for each encryption and the length of transmitting ciphertext will be increased(ciphertext has two more parts:verification key and signature).However,in the construction of this paper,the transmission efficiency is at least twice than that of previous methods.
引文
[1] SHAMIR A.How to Share a Secret[J].Communication of the ACM,1979,22(11):612-613.
    [2] DESMEDT Y.Society and Group Oriented Cryptography:a New Concept[J].Cryptography,1987,20(5):739-760.
    [3] DESMEDT Y,FRANKEL Y.Threshold cryptosystems[C]//On Advances in Cryptology.New York:Springer-Verlag,1989.
    [4] SHOUP V,GENNARO R.Securing Threshold Cryptosystems Against Chosen Ciphertext Attack[C]//International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,1998.
    [5] BONEH D,BOYEN X,HALEVI S.Chosen Ciphertext Secure Public Key Threshold Encryption without Random Oracles[C]//Cryptographers Track at the RSA Conference on Topics in Cryptology.New York:Springer-Verlag,2006:226-243.
    [6] BONEH D,FRANKLIN M.Identity Based Encryption from the Weil Pairing[J].IEEE Trans on Wireless Commun,2003,32(3):213-229.
    [7] BONEH D,CANETTI R,HALEVI S,et al.Chosen-Ciphertext Security from Identity-Based Encryption[C]//Proceedings of Eurocrypt 2004.New York:Springer-Verlag,2004:207-222.
    [8] BONEH D,BOYEN X.Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles[J].Proceedings of Eurocrypt,2004,2004(4):172.
    [9] FUJISAKI E,OKAMOTO T.How to Enhance the Security of Public-Key Encryption at Minimum Cost[C]//International Workshop on Public Key Cryptography.Berlin:Springer,1999:53-68.
    [10]李帅丽,郑严,包小敏.基于双线性对与身份的数字签名方案研究[J].西南大学学报(自然科学版),2009,31(5):71-74.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700