期刊文献+

一个基于分级身份的密码系统

A Hierarchical Identity-Based Cryptosystem
下载PDF
导出
摘要 提出一个基于分级身份的密码系统:包括分级的基于身份的加密和签名方案。在随机预言模型下,新的基于分级身份的加密和签名方案都是可证明安全的,同时在标准模型下,基于分级身份的加密方案是在给定身份攻击下可证明安全的。基于给出的基于分级身份的加密方案,首次提出了分级代理解密的概念,并且给出了安全模型和构造方法。 A new hierarchical identity based (ID-based) cryptosystem is proposed, including hierarchical ID- based encryption and signature. In random oracle model, both hierarchical ID-based encryption and signature schemes are provably secure. Furthermore, the new hierarchical ID-based encryption scheme is secure under selective-ID attack in standard model. Furthermore, the notion of hierarchical proxy decryption is first proposed. Meanwhile, the security model and a generic construction method for proxy decryption are also presented.
出处 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2007年第1期16-20,共5页 Acta Scientiarum Naturalium Universitatis Sunyatseni
基金 国家自然科学基金资助项目(10571181)
关键词 基于身份 分级的 签名 加密 代理解密 ID-based hierarchical signature encryption proxy decryption
  • 相关文献

参考文献9

  • 1SHAMIR A.Identity-based cryptosystems and signature schemes[C].Advances in Cryptology-Crypto 84,volume 196 of LNCS,Springer-Verlag,1984:47-53.
  • 2TSUJII S,ITOH T.An id-based cryptosystem based on the discrete logarithm problem[J].IEEE Journal on Selected Areas in Communication,1989,7(4):467-473.
  • 3BONEH D,FRANKLIN M.Identity-based encryption from the Weil pairing[C].Advances in Cryptology-Crypto 2001,volume 2139 of LNCS,Springer-Verlag,2001:213-229.
  • 4BONEH D,BOYEN X.Secure identity based encryption without random oracles[C].Advances in Cryptology-CRYPTO'04,volume 3152 of LNCS,Springer-Verlag,2004:443-59.
  • 5BONEH D,BOYEN X.Efficient selective-ID identity based encryption without random oracles[C].Advances in Cryptology-EuroCrypt'04,volume 3027 of LNCS,Springer-Verlag,2004:223-238.
  • 6CANETTI,HALEVI S,KATZ J.Chosen-ciphertext security from identity-based encryption[C].Advances in Cryptology-EuroCrypt'04,volume 3027 of LNCS,Springer-Verlag,2004:207-22.
  • 7BONEH D,BOYEN X,GOH E.Hierarchical Identity based encryption with constant ciphertext[C].EuroCrypt'05,volume 3494 of LNCS,Springer-Verlag,2005:440-456.
  • 8CHOW S,HUI L C K,YIU S M,et al.Secure Hierarchical Identity Based Signature and Its Application[C].ICICS'04,volume 3269 of LNCS,Springer-Verlag,2004:480-494.
  • 9LI Jin,ZHANG Fang-guo,WANG Yan-ming.New Hierarchical Identity Based Cryptosystem and CCA-Secure Public Key Encryption.EUC-06,volume 4097 of LNCS,Springer-Verlag,2006:362-371.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部