期刊文献+

基于双线性对的代理重加密方案(英文)

Certificateless Proxy Re-encryption Scheme from Pairings
下载PDF
导出
摘要 代理重加密的概念是由Mambo和Okamoto提出来的,其功能是将用一个用户公钥加密的密文转换成用另一个用户的公钥加密的密文,且加密是针对同一个明文而言的。但是这类方案都是基于传统的PKI公钥密码体制和身份密码体制的。本研究提出了一个新的无证书代理重加密方案,新方案优于先前的方案且能实现多次代理重加密性质,其算法比其它方案更简单,并且给出了详细的CCA安全性证明。 The concept of proxy re-encryption was introduced by Mambo and Okamoto.Its function takes a ciphertext for a message encrypted under an identity's public key and transforms it into a ciphertext for the same message under another identity's public key.But these schemes were generally based on PKC or ID-based cryptosystem.We present a new proxy re-encryption scheme based on certificateless public key cryptosystem.Our scheme has advantages over prior schemes.It can realize multi-use property.The algorithm of our scheme is simpler than that of other schemes and a CCA proof to this scheme is given.
出处 《河北北方学院学报(自然科学版)》 2012年第4期38-44,51,共8页 Journal of Hebei North University:Natural Science Edition
基金 Higher School of Provincial and Outstanding Youth Talent Fund Project[2012SQR141] Natural Science Foundation of Anhui Educational Committee No.KJ2010B059
关键词 无证书 代理加密 重加密 代理重加密 certificateless proxy encryption re-encryption proxy re-encryption
  • 相关文献

参考文献10

  • 1Mambo K. Poxy cryptosystems:delegation of the power to decrypt ciphertexts[J].EICE Trans Fund Electr Comm CompSci,1997,(01):54-63.
  • 2Blaze M,Bleumer G,Strauss M. Divertible protocols and atomic proxy cryptography[A].Heidelberg:Springer-Verlag,1998.127-144.
  • 3Jakobsson M. On quorum controlled asymmetric proxy re-encryption[A].Heidelberg:Springer-Verlag,1999.112-121.
  • 4Dodis Y,Ivan A. Proxy cryptography revisited[A].San Diego:IEEE Conference Publications,2003.80-89.
  • 5Zhou L,Marsh MA,Schneider FB. Distributed blinding for EIGamal re-encryption Technical Report 2004-1924[D].Cornell University,NY USA,2004.
  • 6Ateniese G,Fu K,Green M. Improved proxy re-encryption schemes with application to secure distributed storage[A].San Diego:IEEE Conference Publications,2005.83-107.
  • 7Green M,Ateniese G. Identity-based proxy re-encryption[DB/OL].Http://eprint.iacr.Org/2006/473,.
  • 8Matsuo T. Proxy re-encryption systems for identity-based encryption[A].Heidelberg:Springer-Verlag,2007.247-267.
  • 9Verheul E. Evidence that XTR is more secure than supersingular elliptic curve cryptosystems[A].Beilin:Springer-Verlag,2001.195-210.
  • 10Boneh D,Franklin M. Identity-based encryption from the Weil Pairing.Extended abstract[DB/OL].http://crypto.stanford.edu/~dabo/abstracts/bfibe.html,.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部