期刊文献+

一种基于组合阶双线性对群的HIBE方案

HIBE Scheme Based on Composite Order Bilinear Groups
下载PDF
导出
摘要 目前,大多数HIBE方案都是基于素数阶双线性群的,其密钥和密文中的参数都是在素数阶双线性群上的取值。构造了一种基于组合阶双线性群的HIBE方案。密钥元组中各个参数从一素数阶群中取值,而密文元组的各个参数等于两个不同素数阶群的元素之积,其中一素数阶群的元素充当盲化因子。盲化后的密文能够增强新HIBE方案的安全性。在实际解密过程中,密文中的盲化因子对解密并没有任何影响。新的HIBE方案在标准模型下实现了选择身份攻击安全。 Presently,most of the HIBE schemes are based on the prime order bilinear groups.The author constructed a HIBE scheme based on composite order bilinear groups.The component parameters of secret key tuple are those elements in an group of prime order while the ones of ciphertext tuple are the products of some elements in two groups,which are of different prime order,and elements in one of these groups,which act as blind factors.The blinded ciphertext enhances the security of the new HIBE scheme.The blind factors of the ciphertext have no effects on the decryption.The new HIBE scheme is selective-ID secure in the standard model.
出处 《计算机科学》 CSCD 北大核心 2012年第6期64-67,共4页 Computer Science
基金 国家自然科学基金(60903175 60703048) 湖北省自然科学基金(2009CBD307 2008CDB352)资助
关键词 HIBE IBE 组合阶双线性群 CCA HIBE IBE Composite order bilinear groups CCA
  • 相关文献

参考文献8

  • 1Shamir A. Identity-based cryptosystems and signature schemes [-C]//Proeeedings of CRYPTO 84 on Advances in Cryptology. Springer, 1985.
  • 2Gentry C, Silverberg A. Hierarchical ID-hased eryptographyFC]// Advances in Cryptology Asiacrypt 2002. 2002:149-155.
  • 3Horwitz J, Lynn 13. Toward hierarchical identity-based encryp- tion[-C ff EUROCRYPT' 02 Proceedings of the International Conference on the Theory and Applications of Crytographie Techniques: advances in Cryptology. Springer, 2002.
  • 4Boneh D,Boyen X,Goh E J. Hierarchical identity based encryp- tion with constant size ciphertext[C]ffAdvances in Cryptology CEUROCRYPT 2005. 2005 .. 440-456.
  • 5Boneh D, Goh E J,Nissim K. Evaluating 2-DNF formulas on ci- phertexts[C]//Proceeding of Theory of Cryptography(CTCCy 05). 2005:325-341.
  • 6Lewko A, Waters/3. New techniques for dual system eneryption and fully secure hihe with short ciphertexts[-C3//Theory of Cryptography. 2010: 455-479.
  • 7Boyen X,Waters ]3. Compact group signatures without random oracles[-C-]//Advances in Cryptology-Eurocrypt. 2006 : 427-444.
  • 8王皓,徐秋亮.抗适应性选择身份攻击的匿名HIBE方案[J].计算机学报,2011,34(1):25-37. 被引量:4

二级参考文献12

  • 1Waters B. Dual system encryption: Realizing fully secure IBE and H/BE under simple assumptions//Halevi S. Advances in Cryptology-- CRYPTO 2009. Santa Barbara, CA,USA. Berlin: Springer-Verlag, 2009:619-636.
  • 2Lewko A, Waters B. New techniques for dual system encryption and (ully secure HIBE with short eiphertexts//Micciancio I). Theory of Cryptography-TCC 2010. Zurich, Switzerland. Heidelherg: Springer Verlag, 2010:455-479.
  • 3Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products// Smart N. Advances in Cryptology- EUROCRYPT 2008. Istanbul, Turkey. Berlin: Springer-Verlag, 2008:146-162.
  • 4Shamir A. Identity based cryptosystem and signature scheme//Blakley G R, Chaum D. Advances in Cryptology CRYPTO 1984. Santa Barbara, CA, USA. Berlin: Springe- Verlag, 1985:47-53.
  • 5Horwitz J, Lynn B. Toward hierarchical identity-based encryption//Knudsen L. Advances in Cryptology EURO CRYPT 2002. Amsterdam, The Netherlands. Berlin: Springer- Verlag, 2002:466 -481.
  • 6Boneh D, Crescenzo O D, Ostrovsky R, Persiano G, Public key encryption with keyword search//Cachin C, Camenisch J. Advances in Cryptology EUROCRYPT 2004. Interlaken, Switzerland. Berlin: Springer Verlag, 2004:506- 522.
  • 7Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H. Searchable encryption revisited. Consistency properties, relation to anonymous IBE, and extensions//Shoup V. Advances in Cryptology--CRYPTO 2005. Santa Barbara, CA, USA.Berlin: Springer-Verlag, 2005: 205-222.
  • 8Boyen X, Waters B. Anonymous hierarchical identity-based encryption (without random oracles)//Dwork C. Advances in Cryptology--CRYPTO 2006. Santa Barbara, CA, USA. Berlin: Springer-Verlag, 2006:290-307.
  • 9Shi E, Waters B. Delegating capabilities in predicate encryption systems//Proceedings of the ICALP 2008. Reykjavik, Iceland. Berlin: Springer-Verlag, 2008:560-578.
  • 10Seo J H, Kobayashi T, Ohkubo M, Suzuki K. Anonymous hierarchical identity-based encryption with constant size ciphertexts//Jarecki S, Tsudik G. Public Key Cryptography (PKC 2009). Zurich, Switzerland. Berlin: Springer-Verlag, 2009:215-234.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部