期刊文献+

基于身份广播加密的安全性 被引量:3

Security of identity-based broadcast encryption
下载PDF
导出
摘要 在对基于身份的加密IBE和广播加密BE的安全性概念归纳分析的基础上,总结了基于身份广播加密的安全概念。首先描述了基于身份广播加密中的两种标准安全概念,并提出了攻击模型的形式化定义;然后介绍了主要的安全性并归纳了它们之间的转化关系;最后,提供了两种构建选择密文安全的基于身份广播加密方案的方法。 Based on the analysis of the security notions for Identity-based Encryption (IBE) and Broadcast Encryption (BE), this paper proposes the security notions for identity-based broadcast encryption. First, two standard security notions for identity-based broadcast encryption are described, and the formal definition of their corresponding attack models is presented. Then the main securities are introduced and the transformation rules of these securities are summarized. Finally, two general ways for constructing identity-based encryption schemes are provided.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2010年第1期165-170,共6页 Journal of Jilin University:Engineering and Technology Edition
基金 国家自然科学基金项目(60473099 60873235) 教育部新世纪优秀人才支持计划项目(NCET-06-0300)
关键词 基于身份的广播加密 选择身份安全 完全安全 静态安全 适应性安全 选择性密文安全 identity-based broadcast encryption selective identity security full security static security adaptive security chosen-ciphertext security
  • 相关文献

参考文献27

  • 1Goldwasser S, Micali S. Probabilistic encryption [J]. Journal of Computer and System Sciences, 1984,28(2) :270-299.
  • 2Micali S, Rackoff C, Sloan R. The notion of security for probabilistic cryptosystems[J]. SIAM Journal on Computing, 1988,17(2) : 412-426.
  • 3Dolev D, Dwork C, Naor M. Non-malleable cryp tography[C]// Proceedings of the Twenty-third Annual ACM Symposium on Theory of Computing, 1991:542-552.
  • 4Dolev D, Dwork C, Naor M. Non-malleable cryptography[R]. Technical Report CS95-27, Weizmann Institute of Science, 1995.
  • 5Dolev D, Dwork C, Naor M. Non-malleable cryptography[J]. SIAM Journal on Computing, 2000,20 (2) :391-437.
  • 6Bellare M, Rogaway P. Optimal asymmetric encryption-how to encrypt with RSA[EB/OL]. [2009-01- 20]. http: seclab. cs. ucdavis. edu/papers/Rogways/ oae. pdf.
  • 7Naor M, Yung M. Public-key cryptosystems provably secure against chosen ciphertext attacks[C]// Proceedings of the Twenty-second Annual ACM Symposium on Theory of Computing, 1990: 427-437.
  • 8Rackoff C, Simon D. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack[C]//LNCS, 1991,576:433-444.
  • 9Goldreich O. A uniform complexity treatment of encryption and zero knowledge[J]. Journal of Cryptology, 1993,6(1) :21-53.
  • 10Goldreich O. Foundations of Cryptography: Volume Ⅱ, Basic Applications[M]. Cambridge: Cambridge University Press, 2004.

同被引文献34

  • 1Fiat A,Naor M. Broadcast Encryption[A].Berlin,Germany:Springer,1993.480-491.
  • 2Shamir A. Identity-based Cryptosystems and Signature Sche-mes[A].Berlin,Germany:Springer,1985.47-53.
  • 3Delerablée C. Identity-based Broadcast Encryption with Con-stant Size Ciphertexts and Private Keys[A].Berlin,Germany:Springer,2007.200-215.
  • 4Boneh D,Gentry C,Waters B. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys[A].Berlin,Germany:Springer,2005.258-275.
  • 5Zhang Leyou,Hu Yupu,Wu Qing. New Constructions of Identity-based Broadcast Encryption Without Random Oracles[J].KSII Transactions on Internet and Information Systems,2011,(02):428-439.
  • 6Gentry C,Waters B. Adaptive Security in Broadcast Encryption Systems(with Short Ciphertexts)[A].Berlin,Germany:Springer,2009.171-188.
  • 7Zhang Leyou,Hu Yupu,Wu Qing. Adaptively Secure Identity-based Broadcast Encryption with Constant Size Private Keys and Ciphertexts from the Subgroups[J].Mathematical and Computer Modelling,2012,(01):12-18.
  • 8Bellare M,Boldyreva A,Desai A. Key-privacy in Public-key Encryption[A].Berlin,Germany:Springer,2001.566-582.
  • 9Lewko A,Waters B. New Techniques for Dual System Encry-ption and Fully Secure HIBE with Short Ciphertexts[A].Berlin,Germany:Springer,2010.455-479.
  • 10Zhang Leyou,Hu Yupu,Wu Qing. Fully Secure Identity-based Broadcast Encryption in the Subgroups[J].China Communications,2011,(02):152-158.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部