期刊文献+

一种基于身份的无可信中心密钥管理方案研究 被引量:2

Research on new identity-based key management scheme without trusted party
下载PDF
导出
摘要 传统基于身份的密码系统存在着密钥托管和密钥撤销两大难题。针对该问题,提出一种新的基于身份的无可信中心密钥管理方案。方案利用Weil对的特性和单向函数的稳固性,结合Fujisaki-Okamoto混合变换,借鉴BF方案的时间片思想,添加显式的密钥撤销过程。给出安全性和性能分析。结果证明,此方案安全性较高并在计算效率上有很大提高。 Key escrow and key revocation were the two inherent problems in traditional identity-based Encryption System.A new identity-based key management scheme without trusted party was proposed against these problems.This scheme took advantage of the feature of Weil pairs and the stability of one-way function,combined with Fujisaki-Okamoto hybrid transformation and the thought of time slice in BF-IBE,and added an explicit key revocation process.Finally,the security and performance analysis was given.Result showed that this scheme was more secure,and the efficiency in the calculation was greatly improved.
出处 《铁路计算机应用》 2010年第9期4-7,共4页 Railway Computer Application
基金 国家"863"计划基金资助项目(2009AA01Z423) 国家自然科学基金资助项目(60972012) 北京市教育委员会共建项目专项资助(W08I0040) 通信与信息系统北京市重点实验室资助项目(JSYJD20090001)
关键词 密码系统 密钥管理 双线性映射 Encryption System key management bilinear pairing
  • 相关文献

参考文献8

  • 1Sattam S.Al-Riyami,Kenneth G.Paterson.Certificateless Public Key Cryptography[C].Proc of Advances in Cryptology,Califomia,USA:Springer-Verlag,2003:452-473.
  • 2BONEH D,FRANKLIN M.Identity-based Encryption from the Weil paring[C].Proc of Advances in Cryptology.New York,USA:Springer-Verlag,2001:213-229.
  • 3Cocks C.An Identity Based Encryption Scheme Based on Quadratic Residues[C].Proc of International Conference on Cryptography and Coding-Proceedings of IMA,Cirencester,UK:Springer-Verlag,2001:360-363.
  • 4Horwitz J,Lynn B.Toward Hierarchical Identity-Based Encryption[C].Proc of Advances in Cryptology,California,USA:Springer-Verlag,2002:466-481.
  • 5Sakai R.Kasahara M.ID Based Cryptosystems with Pairing on Elliptic Curve[R].Cryptology ePrint Archive,Report 2003/054.
  • 6Sahai A,Waters B.Fuzzy Identity-Based Encryption[C].Proc of Advances in Cryptology,California,USA:Springer-Verlag,2005:457-473.
  • 7Boneh D,Boyen X.Efficient Selective-ID Secure IdentityBased Encryption without Random Oracles[C].Proc of Advances in Cryptology,California,USA:Springer-Verlag,2004:223-238.
  • 8Waters BR.Efficient Identity-Based Encryption without Random Oracles[C].Proc of Advances in Cryptology,California,USA:Springer-Verlag,2005:114-127.

同被引文献8

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部