期刊文献+

一个单方加密-多方解密的公钥加密方案 被引量:10

A Public Key Encryption Scheme with One-Encryption and Multi-Decryption
下载PDF
导出
摘要 以Shamir的门限秘密共享方案和对称密码算法为基础,基于椭圆曲线上的双线性变换提出了一个具有多个解密者的单方加密-多方解密公钥加密方案.在该方案中,消息发送者具有一个唯一的加密密钥,而每个消息接收者都具有不同的解密密钥.使用加密密钥所加密的密文可以被任意解密密钥所解密,得到同样的明文信息.分析发现,该加密方案不仅安全有效,同时,它还具备前向保密性,即使加密者的主密钥泄露,也不会影响之前加密信息的安全性.文中方案具有非常重要的应用价值,尤其可以用来实现安全广播/组播和会议密钥的安全分发. Based on Shamir's threshold secret sharing scheme and the secure symmetric encryption algorithm,a one-encryption and multi-decryption public key encryption scheme is proposed on bilinear pairing on elliptic curve.In the proposed scheme,the message sender has a unique encryption key,while each message recipient has a different decryption key.A message encrypted using the encryption key can be correctly decrypted by any decryption key.Analysis show that the proposed scheme is a secure and efficient one,and at the same time,this scheme has the property of forward secrecy.Even if the master key of the sender is disclosed,the security of the encrypted messages is not affected.This scheme plays an important role in many applications,especially in the secure broadcast/multicast and secure distribution of conference keys.
出处 《计算机学报》 EI CSCD 北大核心 2012年第5期1059-1066,共8页 Chinese Journal of Computers
基金 国家自然科学基金(61103178) 国家自然科学基金委员会-广东联合基金重点项目(U0835004) 高等学校博士学科点专项科研基金新教师基金(20096102120045) 广东省教育部产学研合作项目(2011A090200068)资助~~
关键词 秘密共享 门限方案 双线性对 安全广播 会议密钥 前向保密性 secret sharing threshold scheme bilinear pairing secure broadcasting conference key forward secrecy
  • 相关文献

参考文献12

  • 1IEEE Standard. P802.11i Draft supplement to standard for telecommunications and information exchange between sys- tems-LAN/MAN specific requirements-Part 11 : WirelessMedium Access Control (MAC) and physical layer (PHY) specifications: Specification for Enhanced Security, 2002.
  • 2GBl5629.11-2003/XGl-2006.信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范第1号修改单.中国标准出版社,2006.
  • 3Baudron O, Pointeheval D, Stern J. Extended notions of Se- curity for multieast public key eryptosystems//Proceedings of the Automata, Languages and Programming 27th Interna- tional Colloquium. Geneva, Switzerland, 2000:499-511.
  • 4Bellare M, Boldyreva A, Micali S. Public-key encryption in a multi-user setting: Security proofs and improvements//Pro- ceedings of the International Conference on the Theory and Application of Cryptographic Techniques. Bruges, Belgium, 2000:259-274.
  • 5Kurosawa K. Multi-recipient public-key encryption with shortened eiphertext//Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosys- terns. Paris, France, 2002:48-63.
  • 6Mu Y, Susilo W, Lin Y. Identity-based broadeasting//Pro- ceedings of the 4th International Conference on Cryptology in India. New Delhi, India, 2003: 177-190.
  • 7Baek J, Safavi-Naini R, Susilo W. Efficient multi-receiver identity-based enerypt~on and its application to broadcast en- cryption//Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography. Les Diablerets, Switzerland, 2005:380-397.
  • 8Pang L J, Wang Y M. A new (t,n) multi-secret sharing scheme based on shamir~ s secret sharing. Applied Mathe- matics and Computation, 2005, 167(2): 840-848.
  • 9Okamoto T, Pointcheval D. The Gap-Problems: A new class of problems for the security of cryptographic schemes//Pro- ceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems. Cheju Island, Korea, 2001:104-118.
  • 10Shamir A. How to Share a Secret. Communications of the ACM, 1979, 22(11): 612-613.

同被引文献64

  • 1张乃通,李晖,张钦宇.深空探测通信技术发展趋势及思考[J].宇航学报,2007,28(4):786-793. 被引量:76
  • 2许春香,李发根,聂旭云,禹勇.现代密码学[M].电子科技大学出版社.
  • 3DIFFIE W, HELLMAN M E.New directions in cryptography[J].IEEE Transactions on Information Theory, 1976(22). 474-492.
  • 4SHAMIR A.How to share a secret communications of the ACM[J]. 1979,22(11) : 612-613.
  • 5BAUDRON O,POINTCHEVAL D,STERN J.Extended notions of security for muhicast public key cryptosystems[C]. Proceedings of the Automata, Languages and Programming 27th International Colloquium, Geneva, Switzerland, 2000.
  • 6BELLARE M, BOLDYREVA A, MICALI S.Pablic-key encryption in a multi-user setting: Security proofs and improvements[C].Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Binges, Belgium, 2000.
  • 7BAEK J ,SAFAVI N R, SUSILO W.Efficient multi-receiver identity-based encryption and its application to broadcast encryption[C].LNCS 3386:Proceedings of the 8th Int Workshop on Theory and Practice in Public Key Cryptography, Berlin : Springer, 2005.
  • 8Akyildiz I F, Xudong W. A survey on wireless mesh networks [J]. IEEE Communications Magazine, 2005,43 (9) .. 23-30.
  • 9Yihehun H, Perrig A. A survey of secure wireless ad hoe routing [J]. IEEE Security and Privacy, 2004,2 ( 3 ) : 28-39.
  • 10Johann M,Dawoud D, Stephen M. A survey on peer-to-peer key management for mobile ad hoc networks [J]. ACM Computing Surveys, 2007,39 (1) .. 1-46.

引证文献10

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部