期刊文献+

基于身份加密的主密钥弹性泄漏

Identity-based Encryption Resilient to Master Key Leakage
下载PDF
导出
摘要 最近几年,各种各样的边信道攻击导致密码系统的秘密信息不同程度泄漏,为此密码学研究者掀起了抗泄漏的密码方案的研究热潮。构造出了一个可以抵抗主密钥泄漏的基于身份加密方案。给出了方案的正确性证明,基于DBDH假设证明了方案的安全性,用信息论熵的理论给出了抗泄漏的性能分析,主密钥的相对泄漏率几乎可以达到1。 In recent years, various side channel attacks have caused leakage of secret information of different cryptographic systems, so cryptography researchers have raised the research upsurge of leakage-resilient cryptographic schemes. An identity based encryption is presented which can resist the master secret key leakage. The correctness of the program is proved. The security of the scheme is obtained based on DBDH assumption. The performance of leakage-resilient is analyzed via the theory of entropy. The relative leakage rate of main secret key can almost reach 1.
出处 《科学技术与工程》 北大核心 2014年第13期217-219,共3页 Science Technology and Engineering
基金 国家自然科学基金(61272542)资助
关键词 主密钥泄漏 基于身份的加密(IBE) 相对泄漏率 最小熵 master key leakage identity-based encryption relative leakage rate minimum entropy
  • 相关文献

参考文献22

  • 1Shamir A. Identity-based cryptosystems and signature schemes. Ad- vances in Cryptology, Springer Berlin Heidelberg, 1985:47-53.
  • 2Agrawal S, Boneh D, Boyen X. Efficient lattice (H) IBE in the standard model. Advances in Cryptology EUROCRYPT 2010, Spring- er Berlin Heidelberg, 2010 : 553-572.
  • 3Boneh D, Boyen X. Efficient selective-ID secure identity-based en- cryption without random oracles. Advances in Cryptology-EURO- CRYPT 2004. Springer Berlin Heidelberg, 2004:223-238.
  • 4Boneh D, Boyen X. Seeure identity based encryption without random oracles. Advances in Cryptology Crypto 2004. Springer Berlin Hei- delberg, 2004 : 443--459.
  • 5Boneh D, Franklin M. Identity-based encryption from the weil pai- ring. Advances in Cryptology CRYPTO 2001. Springer Berlin Heidel- berg, 2001:213-229.
  • 6Chen J, Lim H W, Ling S, et al. Shorter IBE and signatures via asymmetric pairings. Pairing-based Cryptography-Pairing 2012. Springer Berlin Heidelberg, 2013 : 122-140.
  • 7Park J H, Lee D H. A new practical identity-based encryption sys- tem. IACR Cryptology ePrint Archive, 2013:23.
  • 8Dodis Y, Pietrzak K. Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks. Advances in Cryptology- CRYPTO 2010, Springer Berlin Heidelberg, 2010:21--40.
  • 9Rechberger C, Oswald E. Stream ciphers and side-channel analysis. ECRYPT Workshop, SASC-The State of the Art of Stream Ciphers. 2004 : 320-326.
  • 10Ishai Y, Sahai A, Wagner D. Private circuits: securing hardware against probing attacks. Advances in Cryptology-CRYPTO 2003, Springer Berlin Heidelberg, 2003 : 463--481.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部