期刊文献+

标准模型下的抗选择密文攻击基于身份门限解密方案 被引量:3

Identity-Based Threshold Decryption Schemes Secure against Chosen Ciphertext Attacks in the Standard Model
下载PDF
导出
摘要 提出了两个有效的抗选择密文攻击的基于身份门限解密方案.在标准的决定性双线性Diffie-Hellman假设下,它们被证明可以抗选择密文攻击.第一个方案基于Boneh和Boyen提出的一个Selective IBE方案,另外一个方案基于Waters提出的Full IBE方案.与所基于的方案相同,前者的挑战身份要在公共参数选取之前确定,而后者的挑战身份可以由攻击者适应性地选取.据我们所知,以前的相关方案的安全性只能在随机预言机模型中得以证明. We propose two efficient Identity-Based threshold decryption schemes. They are proved secure against chosen ciphertext attacks under the standard decisional bilinear Diffie-Hellman assumption. The first one is constructed from (one of ) the Selective ID-Based Encryption (Selective-IBE) scheme proposed by Boneh and Boyen recently, yet the second one is transformed from the Full ID-Based Encryption (Full-IBE) scheme obtained by Waters. As the based IBE schemes,the attacker in the first proposal has to choose the challenge identity before the common parameter is generated, while the attacker in the second one could choose the identity adaptively. To the best of our knowledge, previous related schemes could only be proved secure in the random oracle model.
出处 《中国科学院研究生院学报》 CAS CSCD 2006年第2期198-204,共7页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 国防科技重点实验室项目(51436050404QT2202) 信息安全国家重点实验室2004年第1批开放课题(01-01)资助
关键词 门限解密 选择密文安全性 决定性双线性Diffie-Hellman假设 threshold decryption, chosen ciphertext security, decisional bilinear Diffie-Hellman assumption
  • 相关文献

参考文献12

  • 1Shamir A.Identity-based cryptosystems and signature schemes.In:Blakley GR,Chaum D.(eds).Advances in Cryptology-Proceedings of CRYPTO 1984.Berlin:Springer-Verlag,1985.47~ 53
  • 2Boneh D,Franklin M.Identity-based encryption from the Weil pairing.In:Kilian J.(ed).Advances in Cryptology-Proceedings of CRYPTO 2001.Berlin:Springer-Verlag,2001.213 ~ 229
  • 3Baek J,Zheng Y.Identity-based threshold decryption.In:Bao F,Deng R,Zhou J.(eds).Practice and Theory in Public Key Cryptography-PKC'2004.Berlin:Springer-Verlag,2004.262~276
  • 4Bellare M,Rogaway P.Optimal asymmetric encryption.In:A.De Santis (ed).Advances in Cryptology -Proceedings of EUROCRYPT'94.Berlin:Springer-Verlag,1995.92~ 111
  • 5Bellare M,Desai A,Pointcheval D,et al.Relations among notions of security for public-key encryption schemes.In:Krawczyk H.(ed).Advances in Cryptology-Proceedings of CRYPTO '98.Berlin:Springer-Verlag,1998.26 ~ 45
  • 6Cramer R,Shoup V.A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack.In:Krawczyk H.(ed).Advances in Cryptology-Proceedings of CRYPTO '98.Berlin:Springer-Verlag,1998.13 ~ 25
  • 7Canetti R,Goldreich O,Halevi S.The random oracle methodology revisited.In:Proceedings of the 13th Annual ACM Symposium on Theory of Computing.New York:ACM,1998.209~218
  • 8Bellare M,Boldyreva A,Palacio A.An uninstantiable random-oracle-model scheme for a hybrid-encryption problem.In:Cachin Ch,Camenisch J.(eds).Advances in Cryptology-Eurocrypt 2004.Berlin:Springer-Verlag,2004.171 ~ 188
  • 9Boneh D,Boyen X.Efficient selective-ID secure identity based encryption without random oracles.In:Cachin Ch,Camenisch J.(eds).Advances in Cryptology-Eurocrypt 2004.Berlin:Springer-Verlag,2004.223 ~ 238
  • 10Waters B.Efficient identity-based encryption without random oracles.http://eprint.iacr.org/2004/180.To appear in Eurocrypt 2005

同被引文献26

  • 1龙宇,陈克非,洪璇.一种新的基于身份选择密文安全的门限解密方案(英文)[J].计算机学报,2006,29(9):1679-1687. 被引量:2
  • 2Desmedt Y,Frankel Y.门限加密系统[M]//计算机科学讲义:Crypto89,柏林:施普林格出版社,1990:307-315.(英文版).
  • 3Shoup V,Gennaro R.门限加密在选择密文攻击下安全性分析[M]//计算机科学讲义:Eurocrypt98.柏林:施普林格出版社,1998:1-16.(英文版).
  • 4Shamir A.基于身份的密码系统与签名方案[M]//计算机科学讲义:密码学进展-CRYPTO84.柏林:施普林格出版社,1984:47-53.(英文版).
  • 5Fiat A,Shamir A.如何认证自己:认证和签名问题的高效解决方案[M]//计算机科学讲义:密码学进展-CRYPTO86.柏林:施普林格出版社,1987:186-194.(英文版).
  • 6Sakai R,Ohgishi K,Kasahara M.基于双线性对的密码学系统[M]// SCIS00,2000:26-28.(英文版).
  • 7Boneh D.,Franklin M.K.Franklin.基于身份双线性配对加密[M]// 计算机科学讲义:密码学进展-CRYPTO 2001,柏林:施普林格出版社,2001:213-229.(英文版).
  • 8Cocks C.基于二次剩余的身份加密系统[M]// 计算机科学讲义:IMACC 2001,柏林:施普林格出版社,2001:26-28.(英文版).
  • 9Baek J,ZHENG Y.基于身份门限解密[M]//计算机科学讲义:PKC 2004.柏林:施普林格出版社,2004:248-261.(英文版).
  • 10Bellare M,Rogaway P.随机预言模式应用:设计有效协议的规则[M]//ACM CCS93,纽约:美国计算机学会出版社,1993:62-73(英文版).

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部