期刊文献+

基于身份的抗选择性公开攻击广播加密方案 被引量:1

Identity based broadcast encryption scheme against selective opening attack
下载PDF
导出
摘要 孙瑾等提出了一种抗选择性公开攻击的身份型广播加密方案(孙瑾,胡予濮.抗选择性公开攻击的身份型广播加密方案.电子与信息学报,2011,33(12):2929-2934),并称该方案具有在标准模型下可证全安全,具有短的尺寸固定的密文和密钥,无须随机标签的特点。然而,研究发现该方案无法正确运行的,进而提出了一种改进方案,并在标准模型给出了改进方案的安全性证明。 Recently Sun Jin,et al.proposed an dentity-based broadcast encryption scheme against selective opening attack,(SUN JIN,HU YU-PU.Identity-based broadcast encryption scheme against selective opening attack.Journal of Electronics and Information Technology,2011,33(12): 2929-2934) and it claimed that the scheme can fight against Selective-Opening Attack(SOA) and has constant-size key and ciphertext in the standard model without random tags.However,this paper proved that their proposal cannot work at all.Furthermore,the authors improved their scheme to be a correct one,and then proved its security in the standard model.
出处 《计算机应用》 CSCD 北大核心 2013年第4期1047-1050,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61103230 61103231 61272492 61202492) 陕西省自然科学基金资助项目(2010JM8034)
关键词 身份型广播加密 密码分析 全安全 identity-based broadcast encryption cryptanalysis full security
  • 相关文献

参考文献13

二级参考文献43

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:104
  • 2庞辽军,柳毅,王育民.一个有效的(t,n)门限多重秘密共享体制[J].电子学报,2006,34(4):587-589. 被引量:26
  • 3Fiat A, Naor M. Broadcast Encryption[C]//Proc. of CRYPTO'94. Berlin, Germany: Springer-Verlag, 1994.
  • 4Scott C. New Constructions on Broadcast Encryption and Key Pre-distribution Schemes[C]//Proc. of IEEE Annual Joint Conf. on Computer and Communications Societies. Minnesota, USA:[s. n.], 2005.
  • 5Naor M. Revocation and Tracing Schemes for Stateless Receivers[C]//Proc. of CRYPTO'01. Berlin, Germany: Springer- Verlag, 2001.
  • 6Hlevy D, Shamire A. The LSD Broadcast Encryption Scheme[C]// Proc. of CRYPTO'02. Berlin, Germany: Springer- Verlag, 2002.
  • 7Fiat A and Naor M.Broadcast encryption[C].CRYPTO'93,1993,LNCS 773:480-491.
  • 8Zhang Y L,Zhang Y K,and Zhang J.An ID-based broadcast encryption scheme for collaborative design[C].International Conference on Networks Security,Wireless Communications and Trusted Computing,IEEE Computer Society,2009,NSWCTC,Vol.346:699-702.
  • 9Delerabl(e)e C,Paillier P,and Pointcheval D.Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys[C].2007,LNCS 4575:39-59.
  • 10Sharmila D S S,Sree V S,and Ragavendran G,et al..Cryptanalysis of ID-based signcryption scheme for multiple receivers[R].Cryptology ePrint Archive,Report 2008/238,2008.

共引文献25

同被引文献12

  • 1翁健,陈泯融,杨艳江,邓慧杰,陈克非,鲍丰.无需随机预言机的自适应攻陷模型下选择密文安全的单向代理重加密方案[J].中国科学:信息科学,2010,40(2):298-312. 被引量:8
  • 2FIAT A, NAOR M. Broadcast encryption [ C]/! CRYPTO'93: Pro- ceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, LNCS 773. Bedim Springer-Verlag, 1993:480-491.
  • 3BONEH D, GENTRY C, WATERS B. Collusion resistant broadcast encryption with short ciphertexts and private keys [ C]// CRYPTO 2005: Proceedings of the 25th Annual International Conference on Advances in Cryptology, LNCS 3621. Berlin: Springer-Verlag, 2005:258-275.
  • 4CHU C K, WENG J, CHOW S S M, et al. Conditional proxy broadcast re-encryption [ C]// ACISP 2009: Proceedings of the 14th Australasian Conference on Information Security and Privacy, LNCS 5594. Berlin: Springer, 2009:327 - 342.
  • 5WATERS B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions [C]//CRYPTO 2009: Proceedings of the 29th Annual International Cryptology Conference on Advancesin Cryptology, LNCS 5677. Berlin: Springer, 2009:619-636.
  • 6MIHIR B, THOMAS R. Simulation without the artificial abort: sim- plified proof and improved concrete security for Waters' IBE scheme [ C]/! EUROCRYPT 2009: Proceedings of the 28th Annual Interna- tional Conference on Advances in Cryptology: the Theory and Appli- cations of Cryptographic Techniques, LNCS 5479. Berlin: Springer, 2009:407-424.
  • 7SHAO J. Anonymous ID-based proxy re-encryption [ C]//ACISP 2012: Proceedings of the 17th Australasian Conference on Informa- tion Security and Privacy. Berlin: Springer, 2012:364 -375.
  • 8鲁力,胡磊.基于Weil对的多接收者公钥加密方案[J].软件学报,2008,19(8):2159-2166. 被引量:9
  • 9庞辽军,李慧贤,焦李成,王育民.可证明安全的多接收者公钥加密方案设计与分析[J].软件学报,2009,20(10):2907-2914. 被引量:12
  • 10廖志委,王晓明.基于秘密共享的广播加密方案[J].计算机应用,2011,31(4):978-980. 被引量:3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部