期刊文献+

一个高效的基于身份的分层加密方案 被引量:6

Efficient hierarchical ID-based encryption scheme
下载PDF
导出
摘要 基于Gentry方案,利用双线性配对,提出了一个高效的基于身份的分层加密方案,在随机预言机模型下证明满足IND-ID-CCA2安全,通过分析,该方案较Gentry方案缩短了密文长度,解密仅需要进行一次双线性配对,大大提高了加密和解密的效率。 This paper proposes an efficient hierarchical id-based encryption scheme with bilinear pairing,which is based on Gentry scheme.This scheme meets IND-ID-CCA2 security in the random oracle model.This scheme reduces the ciphertext length,and only computes bilinear pairing once in the decryption,which increases the efficiency of encryption and decryption,compared with Gentry scheme.
作者 张席 杨玲
出处 《计算机工程与应用》 CSCD 2012年第24期101-105,共5页 Computer Engineering and Applications
关键词 基于身份 分层加密 随机预言机 安全模型 identity-based hierarchical encryption random oracle security model
  • 相关文献

参考文献13

  • 1Shamir A.Identity-based cryptosystems and signature sehemes[C]//Proceedings of Cryptology-Crypt, 1984 : 47-53.
  • 2Horwitz J, Lynn B.Towards hierarchical identity-based en- cryption[C]//Advance of Cryptology-Eurocrypt, 2002 : 466-481.
  • 3Gentry C, Silverberg A.Hierarchical id-based encryption without random oracles[C]//Cryptography-ASIACRYPT, 2002 : 548-566.
  • 4Boneh D, Boyen X.Efficient selectice-ID secure identity based encryption without random oracles[C]//EUROCRYPT' 04,2004: 223-238.
  • 5Boneh D,Boyen X,Goh E J.Hierarchical identity based encryption with constant size[C]//Ciphertext-EUROCRYPT, 2005 : 440-456.
  • 6Boneh D, Franklin M.Identity-based encryption the Weil pairing[J].SIAM Journal on Computing, 2003, 32(3): 586-615.
  • 7Chatterjee S, Sarker ROn hierarchical identity based en- cryption protocols with short public parameters[C]//Proc of the 8th Annual International Conference on Informa- tion Security and Cryptology,2005:424-440.
  • 8Goldwasser S,Micali S,Rivest R L.A digital signature scheme secure against adaptive chosen-message attacks[J]. SIAM Journal on Computing, 1988,17(2) :281-308.
  • 9Bellare M,Rogaway ERandom oracles are practical:a paradigm for designing efficient protocols[C]//First ACM Conference on Computer and Communications Security. NY : ACM, 1993 : 62-73.
  • 10Du Hongzhen, Wen Qiaoyan.An efficient identity based multi-recipient signcryption scheme[J].Journal of Shen- zhen University Science and Engineering,2009,26(2): 127-131.

二级参考文献24

  • 1Zheng Y.Digital Signcryption or How to Achieve Cost (Signature & Encryption) 《 《 Cost (signature) + Cost (encryption)[M] //LNCS:CRYPTO'97.Berlin:Springer-Verlag Press,1997:105-179.
  • 2Shamir A.Identity-based Cryptosystems and Signatureschemes[M] //LNCS:CRYPT'84.Berlin:SpringerVerlag Press,1984:47-53.
  • 3Fiat A,Shamir A.How to Prove Yourself:Practical Solutions to Identification and Signature Problems[M] //LNCS:CRYPT'86.Berlin:Springer-Verlag Press,1986:186-194.
  • 4Cocks C.An Identity Based Encryption Scheme Based on Quadratic Residues[M] //LNCS:IMACC'01.Berlin:Springer-Verlag Press,2001:360-363.
  • 5Boneh D,Franklin M K.Identity-based Eneryption from the Weil Pairing[M] //LNCS:CRYPT'O1.Berlin:Springer-Verlag Press,2001:213-229.
  • 6Malone-Lee J,Mao W.Two Birds One Stone:Signcryption Using RSA.[M] //LNCS:CT-RSA'03.Berlin:SpringerVerlag Press,2003:211-225.
  • 7Barreto P,Libert B,McCullagh N,et al.Efficient and Provably-secure Identitybased Signatures and Signeryption from Bilinear Maps[M] //LNCS:ASIACRYPT'05.Berlin:Springer-Verlag Press,2005:515-532.
  • 8Boyen X.Multipurpose Identity-based Signcryption (a Swiss Army Knife for Identitybased Cryptography)[M] //LNCS:CRYPT'03.Berlin:Springer-Verlag Press,2003:383-399.
  • 9Chen L,Malone-Lee J.Improved Identity-based Signeryption[M] //LNCS:PKC'05.Berlin:Springer-Verlag Press,2005:362-379.
  • 10Practicalidentity-basedthreshold decryption scheme without random oracle[J].Journal of Shenzhen University Science and Engineering,2010,27(3):340-346.

共引文献9

同被引文献52

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部