期刊文献+

抗自适应泄漏的基于身份加密方案 被引量:3

Identity-based encryption scheme against adaptive leakage
下载PDF
导出
摘要 针对基于身份的加密(IBE)体制中缺乏有效抗自适应泄漏方案的问题,运用熵抗泄漏的基本思想,定义了自适应泄漏攻击下IBE的安全性;利用基于身份的散列证明系统(IB-HPS)和提取器,提出了抗自适应泄漏的IBE方案;并对其进行实例化,构建了基于q-TABDHE假设的抗自适应泄漏的IBE方案。安全性分析表明,设计的IBE方案是选择明文攻击安全的,它不仅能够有效地抵抗自适应泄漏,而且能够容忍较大的密钥泄漏量。 In allusion to the problem that scheme resilient to adaptive leakage was lacked in identity-based encryptionr a notion of entropic leakage-resilient was used to define the security against adaptive leakage in IBE. Then by using iden- tity-based hash proof system and extractors, an adaptive-leakage secure IBE scheme was proposed. And for instantiation, an IBE scheme against adaptive leakage based on q-TABDHE assumption was constructed. Security analysis shows that the scheme achieves chosen-plaintext attack security, and it can not only resist adaptive leakage effectively, but also tol- erate more key leakage.
出处 《通信学报》 EI CSCD 北大核心 2012年第7期90-95,共6页 Journal on Communications
基金 国家自然科学基金资助项目(61070170) 苏州市应用基础研究计划基金资助项目(SYJG09024) 苏州市融合通信重点实验室基金资助项目(SZS0805)~~
关键词 自适应泄漏 基于身份的加密 熵抗泄漏 q-TABDHE假设 adaptive leakage identity-based encryption entropic leakage-resilient q-TABDHE assumption
  • 相关文献

参考文献19

  • 1KOCHER P. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems[A]. CRYPTO 1996[C]. Santa Barbara, California, USA, 1996. 104-113.
  • 2KOCHER P, JAFFE J, JUN B. Differential power analysis[A]. CRYPTO 1999[C]. Santa Barbara, California, USA, 1999. 388-397.
  • 3ISHAI Y, S,M-IAI A, WAGNER D. Private circuits: securing hardware against probing attacks[A]. CRYPTO 2003[C]. Santa Barbara, California, USA, 2003.463-481.
  • 4MICALI S, REYZIN L. Physically observable cryptography[A]. TCC 2004[C]. Cambridge, MA, USA, 2004. 278-296.
  • 5DZIEMBOWSKI S, PIETRZAK K. Leakage-resilient cryptography[A]. FOCS 2008[C]. Philadelphia, PA, USA, 2008.293-302.
  • 6AKAVIA A, GOLDWASSER S, VAIKUNTANATHAN V. Simultaneous hardcore bits and cryptography against memory attacks[A]. TCC 2009[C]. San Francisco, CA, USA, 2009. 474-495.
  • 7NAOR M, SEGEV G. Public-key cryptosystems resilient to key leakage [A]. CRYPTO 2009[C]. Santa Barbara, California, USA, 2009. 18-35.
  • 8ALWEN J, DODIS Y, NAOR M, et al. Public-key encryption in the bounded-retrieval model[A]. EUROCRYPT 2010[C]. Monaco and Nice, French Riviera, 2010. 113-134.
  • 9BRAKERSKI Z, KALAI Y T, KATZ J, et al. Cryptography resilient to continual memory leakage[A]. FOCS 2010[C]. Las Vegas, Nevada, USA, 2010. 501-510.
  • 10JUMA A, VAHLIS Y. Protecting cryptographic keys against continual leakage[A]. CRYPTO 2010[C]. Santa Barbara, California, USA,2010. 41-58.

同被引文献18

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部