期刊文献+

A Survey of Identity-based and Attribute-based Cryptography

A Survey of Identity-based and Attribute-based Cryptography
下载PDF
导出
摘要 We survey the state of research on identity-based cryptography and attribute-based cryptography.We firstly review the basic concepts of identity-based cryptographic schemes in which users' identifier information such as email or IP addresses instead of digital certificates can be used as public key for encryption or signature verification,and subsequently review some important identity-based encryption,signature and signcryption schemes.Then we give our research on Identity-Based Encryption-Signature(IBES) method.We also survey the attribute-based cryptographic schemes in which the identity of user is viewed as a set of descriptive attributes,including some important attribute-based encryption and signature schemes.We subsequently give our research on Attribute-Based Encryption and Identity-Based Signature (ABE-IBS) method.Both methods aim at efficiently improving the security of wireless sensor network.Finally,we propose a few interesting open problems concerning with practical and theoretical aspects of identity-based cryptography and attribute-based cryptography. We survey the state of research on identity-based cryptography and attribute-based cryptography. We firstly review the basic concepts of identity-based cryptographie schemes in which users' identifier information such as email or IP addresses instead of digital certificates can be used as public key for encryption or signature verification, and subsequently review some important identity-based encryption, signature and signcryption schemes. Then we give our research on Identity-Based Encryption-Signature (IBES) method. We also survey the attribute-based cryptographic schemes in which the identity of user is viewed as a set of descriptive attributes, including some important attribute-based encryption and signature schemes. We subsequently give our research on Attribute-Based Encryption and Identity-Based Signature (ABE-IBS) method. Both methods aim at efficiently improving the security of wireless sensor network. Finally, we propose a few interesting open problems concerning with practical and theoretical aspects of identity-based cryptography and attribute-based cryptography.
机构地区 College of Computer
出处 《南京邮电大学学报(自然科学版)》 2010年第1期11-17,共7页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 supported by the National Natural Science Foundation of China(No. 60873231) Natural Science Fund for Colleges and the Universities of Jiangsu Province(No. 08KJB520006) Natural Science Foundation of Jiangsu Province(No. BK2009426) Colleges and Universities of Jiangsu Province Plans to Graduate Research and Innovation(No.CX09B_151Z) the Innovation Fund of NJUPT(No.NY208006)
关键词 计算机网络 网络安全 密码系统 服务器 attribute-based cryptography, network security, identity-based cryptography, wireless sensor network
  • 相关文献

参考文献40

  • 1SHAMIR A. Identity-based cryptosystem and signature schemes [ C ]//Proceedings of CRYPTO' 84. Berlin: Springer, 1985, LNCS 196:47 - 53.
  • 2SAHAI A ,WATERS B. Fuzzy identity-based encryption [ C ] //Proceedings of EUROCRYPT 2005. Berlin: Springer, 2005, LNCS 3494:457 - 473.
  • 3BONEH D, FRANKLIN M. Identity based encryption from weil pairing[ C ] //Proceedings of Crypto 2001. Berlin : Springer, 2001, LNCS 2139:213 - 229.
  • 4CANETTI R,HALEVI S,KATZ J. A forward-secure public-key encryption scheme [ C ] //Proceedings of Eurocrypt 2003. Berlin : Springer,2003, LNCS 2656:255 - 271.
  • 5BONEH D, BOYEN X. Efficient selective-id secure identity based encryption without random oracles [ C ] //Proceedings of EUROCRYPT' 04. Berlin : Springer,2004, LNCS 3027:223 - 238.
  • 6FIAT A, SHAMIR A. How to prove yourself: Practical solutions to identification and signature problems [ C ] // Proceedings of Crypto' 86. Berlin : Springer, 1986, LNCS 263 : 186 - 194.
  • 7GUILLOU L, QUISQUATER J J. A " paradoxical" identity-based signature scheme resulting from zero-knowledge [ C ] // Proceedings of Crypto ' 88. Berlin: Springer, 1988, LNCS 403:216 - 231.
  • 8CHA J C,CHEON J H. An identity-based signature from gap difiehellman groups [ C ]//Proceedings of Public Key Cryptography-PKC 2003. Berlin: Springer,2003, LNCS 2567 : 18 - 30.
  • 9HESS F. Efficient identity based signature schemes based on pairings[ C ]//Proceedings of SAC 2002. Berlin : Springer,2002, LNCS 2595:310 -324.
  • 10BOYEN X, MEI Q, WATERS B. Direct chosen ciphertext security from identity-based techniques[ C ]//Proceedings ofACM CCS 05. New York : ACM ,2005:221 - 238.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部