期刊文献+

不使用对的基于身份的广播加密

Identity based broadcast encryption without pairings
下载PDF
导出
摘要 基于身份的加密方案和基于身份的广播加密方案一般都是使用椭圆曲线上的双线性映射(也称为对)来实现的。提出一个不使用双线性映射的基于身份的广播加密方案,基于二次剩余假设,在Random Oracle模型下是可证安全的。 Identity Based Encryption(IBE) schemes and Identity Based Broadcast Encryption(IBBE) schemes are often constructed by using bilinear maps ( a. k. a. parings) on elliptic curves. In this paper, an Identity Based Broadcast Encryption scheme without pairings was given. It is secure in Random Oracle according to the Quadratic Residuosity assumption.
出处 《计算机应用》 CSCD 北大核心 2008年第2期432-433,436,共3页 journal of Computer Applications
关键词 广播加密 基于身份的加密 基于身份的广播加密 二次剩余 broadcast encryption Identity Based Encryption ( IBE ) Identity Based Broadcast Encryption (IBBE) Quadratic Residuosity(QR)
  • 相关文献

参考文献13

  • 1BONEH D,FRANKLIN M.Identity based encryption from the Weil pairing[C]// Cryptology-Crypto01.German:Springer-Verlag.2001:213-229.
  • 2BONEH D,BOYEN X.Efficient selective-ID identity based encryption without random oracles[C]// Advances in Cryptology-Eurocrypt 2004.German:Springer-Verlag,2004:223-238.
  • 3BONEH D,BOYEN X.Secure identity based encryption without random oracles[C]// Advances in Cryptology-Crypto 2004.Germany:Springer-Verlag,2004:443-459.
  • 4WATERS B.Efficient selective-ID identity based encryption without random oracles[C]// Proceedings of Eurocrypt 2004,LNCS 3027.Berlin:Springer-Verlag,2004:223-238.
  • 5COCKS C.An identity based encryption scheme based on quadratic residues[C]// Cryptography and Coding.Germany:Springer-Verlag,1999:205-221.
  • 6GENTRY D B C,HAMBURG M.Space-efficient identity based encryption without pairings[EB/OL].[2007-02-15].http://eprint.iacr.org/2007/177.pdf.
  • 7BERKOVITS S.How to broadcast a secret[C]// International Conference on the Theory and Application of Cryptographic Techniques.Berlin:Springer Verlag,1991:535-541.
  • 8FIAT A,NAOR M.Broadcast Encryption[C]// 13th Annual International Cryptology Conference.Berlin:Springer-Verlag,1993:480-491.
  • 9NAOR D,NAOR M,LOTSPIECH J.Revocation and tracing schemes for stateless receivers[C]// 21th Annual International Cryptology Conference.Heidelberg:Springer,2001:41-62.
  • 10HALEVY D,SHAMIR A.The LSD broadcast encryption scheme[C]// 22th Annual International Cryptology Conference.Heidelberg:Springer,2002:47-60.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部