期刊文献+

一个高效安全的空间加密方案 被引量:1

An Efficient and Secure Spatial Encryption Scheme
下载PDF
导出
摘要 将空间向量对应于合数群上的元素,基于三素数子群判定问题,利用双系统技术构造了一个在自适应的模型下更加有效、安全的空间加密方案.结果表明,由于不需要进行大量的矩阵运算,所提出的加密方案具有较高的效率和良好的性能. Spatial encryption was first introduced as an instance of generalized identity-based encryption by Boneh and Hamburg in 2008. Their scheme is only secure in selective model. This paper constructed a full secure and more efficient spatial encryption scheme which differs from Boneh and Hamburg's scheme. The paper introduces a technique to map a vectors to elements of groups. Then it applies the dual system technique. With this technique and the three composite order bilinear groups decision problem, it can prove full security of the scheme in adaptive model. Because of only computing in composite groups without matrix, the efficiency of the scheme is much improved.
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2012年第9期1361-1365,共5页 Journal of Shanghai Jiaotong University
基金 国家自然科学基金资助项目(60970110 61033014 61161140320)
关键词 空间加密 身份基加密 自适应 安全性 合数群 双系统 spatial encryption identity based encryption self-adaption security composite order group dual system
  • 相关文献

参考文献8

  • 1Shamir A.Identity-based cryptosystems and signature schemes [J].Lecture Notes in Computer Science,1985,196:47-53.
  • 2Boneh D,Franklin M.Identity-based encryption from weil pairing [J].Lecture Notes in Computer Science,2001,2139:13-229.
  • 3Cocks C.An identity based encryption scheme based on quadratic residues [J].Lecture Notes in Computer Science,2001,2260:360-363.
  • 4Boldyreva A,Goyal V,Kumar V.Identity-based encryption with efficient revocation [C]∥Proceedings of the 15th ACM Conference on Computer and Communications Security.New York,USA:ACM,2008:417-426.
  • 5Lewko A,Waters B.New techniques for dual system encryption and full secure HIBE with shortciphertexts [J].Lecture Notes in Computer Science,2010,5978:455-479.
  • 6Boneh D,Hamburg M.Generalized identity based and broadcast encryption schemes [J].Lecture Notes in Computer Science,2008,5350:455-470.
  • 7Zhou Mu-xin,Cao Zhen-fu.Spatial encryption under simpler assumption [J].Lecture Notes in Computer Science,2009,5848:19-31.
  • 8Boneh D,Goh E J,Nissim K.Evaluating 2-DNF formulas on ciphertexts [J].Lecture Notes in Computer Science,2005,3378:325-341.

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部