期刊文献+

一种安全可追责的基于身份密码方案

One kind of Provable Secure Accountable Identity-Based Encryption
下载PDF
导出
摘要 可追责的基于身份密码体制可以缓解基于身份密码体制的密钥托管问题:仲裁者根据获取的非法私钥判断其是否由私钥生成器恶意生成。本文针对一种可行的可追责的基于身份密码方案,将其中的零知识证明改为用双线性对运算实现;以此为基础,结合一次性签名方案提出一种具有IND-sID-CCA安全性的可追责的基于身份密码方案,并给出相关证明。 Accountable identity-based cryptography can ease the inherent key escrow problem of identity-based cryptography: an arbiter could make the judgment of whether PKG has done the malicious behavior to generate the private key or not according to the obtained illegal private key. In this paper, the authors focus on a practical accountable identity-based cryptographic scheme and achieve the scheme by using bilinear pairing instead of ze- ro-knowledge proof; furthermore, the authors propose an IND - sID - CCA security accountable identity-based cryptographic scheme combined with a one-time signature scheme, and give the relevant proof at last.
出处 《贵州大学学报(自然科学版)》 2013年第6期74-76,90,共4页 Journal of Guizhou University:Natural Sciences
基金 国家自然科学基金项目(61262073 60963023) 贵州省自然科学基金项目(20092113) 贵州省高层次人才科研条件特助经费项目(TZJF-2008年33号)
关键词 基于身份 双线性对 可追责 可证明安全 identity-based pairing accountable provable secure
  • 相关文献

参考文献9

  • 1Aniket Kate,Ian Goldberg. Distributed priate-key generators for identity-based cryptography[J].Security and Cryptography for Networks,2010.436-453.
  • 2Sattam S.Al-Riyamiand,Kenneth G.Paterson. Certificateless public key cryptography[J].Lecture Notesin Computer Science,2003.452-473.
  • 3Craig Gentry. Certificate-based encryption and the certificatere vocation problem[J].{H}Lecture Notes in Computer Science,2003.272-293.
  • 4Vipul Goyal. Reducing trust in the PKG in identity based cryptosystems[M].New York:ACM New York,2007.430-447.
  • 5Vipul Goyal,Steve Lu,Amit Sahai. Black-box accountable authority identity-based encryption[M].New York:ACM New York,2008.427-436.
  • 6Libert,B,D.Vergnaud. Towards Practical Black-Box Accountable Authority IBE:Weak Black-Box Traceability With Short Ciphertexts and Private Keys[J].Information Theory IEEE Transactions on,2011,(10):7189-7204.
  • 7甄鸿鹄,陈越,李乐,马会娟.基于身份的一次性公钥分析与重构[J].计算机工程,2010,36(1):187-188. 被引量:4
  • 8任伟.可证明安全公钥密码学探究[J].信息网络安全,2011(11):1-4. 被引量:5
  • 9Ran Canetti,Skai Halevi,Jonathan katz. A forward-secure public-key encryption scheme[M].Bexlin:Springer-Verleg,2003.255-271.

二级参考文献8

  • 1杨浩淼,孙世新,李洪伟.双线性Diffie-Hellman问题研究[J].四川大学学报(工程科学版),2006,38(2):137-140. 被引量:12
  • 2张胜,徐国爱,胡正名,杨义先.一种基于身份一次性公钥的构造[J].电子与信息学报,2006,28(8):1412-1414. 被引量:12
  • 3Menezes A, Okamoto T, Vanstone S. Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field[J]. IEEE Trans. on Information Theory, 1993, 39(5): 1639-1646.
  • 4Barreto P S, Kim H Y, Lynn B, et al. Efficient Algorithms for Pairing Based Cryptosystems[C]//Proc. of CRYPTO'02. Berlin, Germany: Springer-Verlag, 2002: 354-368.
  • 5Hess F. Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairing[EB/OL]. (2002-01-30). http://epring.iacr. org.
  • 6祝跃飞等.公钥密码学设计原理与可证明安全[M].北京:高等教育出版社,201066-68.
  • 7肖国镇,张宁译.密码学导引:原理和应用[M].北京:清华大学出版社,2008.179,195.
  • 8Katz J,Lindel Y.现代密码学--原理与协议[M].任伟译.北京:国防工业出版社,2010:313-318,280-281.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部