期刊文献+

策略加密的信任协商隐私保护 被引量:1

Police-based encryption for privacy protection of trust negotiation
下载PDF
导出
摘要 自动信任协商隐私保护技术不断发展,隐藏证书是其中较为全面的解决方案。针对隐藏证书技术存在解密盲目性,造成解密运算执行代价高的弱点,提出基于策略的椭圆曲线双线性对加密算法的信任协商隐私信息保护(PBE-PP)方案。该方案在BDH问题困难的假设下,在随机预言模型中证明是IND-Pol-CCA安全的。与隐藏证书和其它基于策略加密方案相比,执行效率更高、安全性更好、密文长度更短。 Privacy protection technologies of automated trust negotiation have witnessed great development,among which hidden credentials is an admittedly more satisfactory one.However,for hidden credentials,there exists fatal weakness of blindly decryption,which results decryption execution costly.To solve the problem,using bilinear pairings over elliptic curves,a policy-based encryption for privacy protection is proposed.Under the assumption of BDH problem,the scheme is proven to be IND-Pol-CCA safety in the random prediction model.Compared with hidden credentials and other encryption solutions based on policy,this scheme is more efficient,secure and of shorter length of cipher text.
作者 喻玲 陈蜀宇
出处 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第2期52-57,共6页 Journal of Chongqing University
基金 重庆市自然科学基金CSTC资助项目(2008BB2307)
关键词 自动信任协商 隐私 加密 双线性对 CDH-问题 automated trust negotiation privacy encryption bilinear pairings CDH-problem
  • 相关文献

参考文献3

二级参考文献59

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 3李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 4Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179
  • 5Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81
  • 6Pang X. , Tan K. L. , Wang Y. , Ren J.. A secure agent-mediated payment protocol. In: Deng R. H. , Qing S. , Bao F. ,Zhou J. eds.. Information and Communications Security-ICICS 2002, Lecture Notes in Computer Science 2513. Berlin:Springer-Verlag, 2002, 422-433
  • 7Shamir A.. Identity-based cryptosystems and signature schemes. In: Blakley G. R. , Chaum D. eds.. Advances in Cryptology-CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984, 47-53
  • 8Boneh D. , Franklin M.. Identity-based encryption from the Weil pairing. In: Kilian J. ed.. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001, 213-229
  • 9Malone-Lee J.. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, IACR, 2002
  • 10Libert B. , Quisquater J.. A new identity based signcryption schemes from pairings. In: Proceeding of the 2003 IEEE Information Theory Workshop, Paris, France, 2003, 155-158

共引文献129

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部