期刊文献+

一种基于身份无可信中心的认证加密新方案

A New Identity-Based Authenticated Encryption Scheme Without Trusted Center
下载PDF
导出
摘要 现有基于身份的认证加密方案普遍需要无条件信任私钥产生中心PKG,恶意PKG能够假冒系统内任何用户收发消息,安全隐患突出。新方案中将PKG生成的私钥信息和用户私有信息共同构成用户私钥,保证用户私钥只为用户所有,结合双线性映射的特征加以验证。新方案保留了PKG作为私钥产生中心在密钥分配管理方面的优势,同时巧妙地消除了PKG作为可信中心存在的安全隐患,解决了可信PKG与无可信认证加密之间的矛盾。分析表明,方案是安全高效的。 In view of existing situation that identity-based authenticated encryption schemes generally needed to trust the PKG(private key generator)unconditionally,then the situation that PGK faked any users within the system to send messages or read the unauthorized messages had become increasingly serious.In this new scheme,user's private key is made from the private key which generated by the PKG and the private infomation which owned to user,eventually achieved user private key privatization.The security is verified by the characteristics of bilinear pairings.The new scheme not only keep advantage of PKG as a private key generator on key distribution management,but also skillfully solve the safety risks problem of PKG as a trusted center,and solve the contradiction between the trusted PKG and untrusted authenticated encryption.Analysis suggests that the proposed scheme is safe and effective.
作者 蔡艳桃
出处 《信息安全与技术》 2016年第3期52-54,71,共4页
关键词 基于身份 认证 加密 双线性映射 无可信中心 identity-based authentication encryption bilinear pairings untrusted center
  • 相关文献

参考文献6

二级参考文献34

  • 1SHAMIR A.Identity-based cryptosystems and signature schemes[C].//LNCS 2248:Advances in Cryptology,Asiacrypt 2001.Berlin:Springer,2001:514-532.
  • 2JOUX.A.A one round protocol for tripartite Diffie-Hellman[C].//LNCS 1838.Algorithmic Number Theory Symposium.ANTS-IV.Berlin:Spring-Verlag,2000:385-394.
  • 3BONEH D,FRANKLIN M,Identity-based encryption from the Weil pairing[C].//LNCS 2139.Cryptology-CRYPTO 2001.Berlin:Springer-Verlag,2001:213-229.
  • 4Hess F.Efficient identity based signature schemes based on Pairings[C].SAC2002,LNCS 2595,Berlin:Springer-Verlag,2003:310-324.
  • 5Chen X,Zhang F and Kim K.ID-based multi-proxy signature scheme from Bilinear Pairings[A].In Proceedings of WISA'2003,August 2003,Jeju Island(KR),585-592.
  • 6Liao jian,Xiao Jun-fang,Qi Ying-hao..ID-based signature scheme without trusted PKG[C].//LNCS 3822:CISC 2005.Berlin:Springer,2005,1:53-62.
  • 7Horster P,Michels M,Petersen H.Authenticated Encryption Scheme with Low Communication Costs[J].Electronic Letters,1994,30(15):1212-1213.
  • 8Lee W B,Chang C C.Authenticated Encryption Scheme Without Using a One Way Function[J].Electronic Letters,1995,31(19):1656-1657.
  • 9Zheng Y.Signcryption and Its Application in Efficient Public Key Solution[C].Proceedings of Information Security Workshop,1998:291-312.
  • 10Ma C S,Chen K F.Publicly Verifiable Authenticated Encryption[J].Electronic Letters,2003,39(19):281-282.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部