期刊文献+

Boneh-Boyen_1基于身份加密体制的安全密钥分发 被引量:3

Secure Key Issuing for Boneh-Boyen_1 Identity-based Encryption
下载PDF
导出
摘要 为了提高基于身份加密体制的用户密钥安全性,解决基于身份加密体制中的密钥托管问题成为一个重要课题。提出了一种针对Boneh-Boyen1基于身份加密体制的安全密钥分发方案,方案中系统的主密钥分片分别保存于一个密钥生成中心和多个密钥隐私中心处,用户的私钥生成需要用户收到密钥生成中心和密钥隐私中心发来的多个私钥分片,以避免密钥生成中心获取用户的私钥。在标准模型中证明了密钥分发方案能够保证密钥生成中心无法获取用户的私钥,能够有效解决Boneh-Boyen1基于身份加密方案的密钥托管问题。 By making use of user's identity as his public key, identity based cryptosystems have many advantages over traditional PKI based cryptosystems. But identity based cryptosystems also have an inherent drawback of key escrow that the key generation center knows all private keys of users. To improve the security of keys in identity based encryption, how to avoid key escrow problem in identity based encryption becomes a hot issue. A secure key issuing scheme for Boneh-Boyenl identity based encryption was proposed, in which multiple key privacy authorities are set in addition to the key generation center to protect the privacy of users' private keys. A rigorous security proof in standard model of our secure key issuing protocol was also given. Thus identity based encryption is more usable in practice.
出处 《计算机科学》 CSCD 北大核心 2012年第B06期35-37,50,共4页 Computer Science
关键词 基于身份密码学 密钥托管 安全密钥分发 密钥生成中心 双线性对 Identity based cryptography Key escrow Secure key issuing Key generation center BiIinear pairings
  • 相关文献

参考文献14

  • 1Boneh D, Franklin M. Identity-based encryption from the weil pairing [C]//Proc of the Crypto 2001. Berlin: Springer, 2001: 213-229.
  • 2Chen L, Harrison K, Soldera D, et al. Applications of multiple trust authorities in pairing based cryptosystems [C]// Proc of the International Conference on Infrastructure Security 2002. Berlin.. Springer, 2002 : 260-275.
  • 3Goldberg K I. A distributed private-key generator for identity- based cryptography [R]. University of Waterloo, 2007.
  • 4Gentry C. Certificate-based encryption and the certificate-revocation problem [C]//Proc of Eurocrypt 2003. Berlin: Springer, 2003 : 272-291.
  • 5Al-Riyami S S, Paterson K G. Certificateless public key cryptography [C]///Proc of the 9th International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Spring, 2003 : 452-473.
  • 6Lee B, Boyd C,Dawson E, et al. Secure key issuing in id-based cryptography [C]//Proc of the 2nd Australasian Information Security Workshop. Australia: CRPIT, 2094.
  • 7Gangishetti R,Gorantla M C, Das M, et al. Threshold key issuing in identity-based cryptosystems[J]. Computer Standards Interfaces, 2007,29 (2): 260-264.
  • 8Chunxiang X,Junhui Z,Zhiguang Q. A Note on Secure Key Issuing in ID-based Cryptography [EB/OL]. http://eprint. iaer. org/2005/180.
  • 9Lee B. Unified public key infrastructure supporting both certificat.based and ID-based cryptography [C]//Proc of the 2010 International Conference on Availability, Reliability and Security. Poland: IEEE, 2010 : 54-61.
  • 10Boyen X. A tapestry of identity-Based encryption: practical fra meworks compared[J]. International Journal of Applied Cryptography, 2008,1 (1) : 3-21.

同被引文献9

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部