期刊文献+

基于身份的单向多用的代理重加密方案 被引量:2

Identity-based multi-use and unidirectional proxy re-encryption scheme
下载PDF
导出
摘要 针对大多单向多用的代理重加密方案存在密文大小、计算代价会随着重加密的次数增多而增加的问题,在Toshihiko的代理重加密方案的基础上,构造了一个基于身份的单向多用的代理重加密方案。相比已有的基于身份的代理重加密方案,方案需要密钥生成中心为用户生成两类密钥,一类用于解密密文的密钥;另一类用于重加密的密钥。新方案具有固定密文长度,并在随机预言模型下证明了安全性。 The authors found one drawback of some existing multi-use and unidirectional PRE schemes which the ciphertext size and computational complexity expanded with respect to the number of re-encryptions. Therefore,based on Toshihiko's scheme,this paper constructed an identity-based multi-use and unidirectional proxy re-encryption scheme. In comparison with existed identity-based proxy re-encryption schemes,the proposed scheme needed the private key generator to generate two kinds of keys for users,one was decryption private key that was employed in decryption process and the other was proxy private key that helped users to translate ciphertexts. In the new scheme,the size of ciphertext is constant regardless of how many times it has been re-encrypted,and it can be proved secure in random oracle model.
出处 《计算机应用研究》 CSCD 北大核心 2014年第8期2477-2480,2484,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61163038 61262057)
关键词 代理重加密 基于身份的密码体制 多用的 proxy re-encryption(PRE) identity-based cryptography multi-use
  • 相关文献

参考文献17

  • 1BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography[ C ]//Lecture Notes in Computer Science, vol 1403. Berlin : Springer, 1998 : 127-144.
  • 2ATENIESE G, FU K, GREEN M,et al. Improved proxy re-encryption schemes with applications to secure distributed storage [ J ]. ACM Trans on Information and System Security,2006,9 ( 1 ) : 1 - 30.
  • 3GREEN M, ATENIESE G. Identity-based proxy re-encryption [ C ]// Lecture Notes in Computer Science, vo14521. Berlin : Springer,2007 : 288-306.
  • 4LIU Qin, WANG Guo-jun, WU Jie. Time-based proxy re-eneryption scheme for secure data sharing in a cloud environment [ J ]. Informa- tion Sciences ,2012,192( 1 ) :228-243.
  • 5SEO J W, YUM D H, LEE P J. Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles [ J ]. Theoretical Com- puter Science,2013,491:83-93.
  • 6MALIK A,RANA S,GUJRAL R. I-PRE:improved proxy re-encryption scheme for VANET [ J ]. International Journal of Computer Science Issues ,2012,9 (3) :318- 324.
  • 7FANG LiMing,WANG JianDong,GE ChunPeng,REN YongJun.Fuzzy conditional proxy re-encryption[J].Science China(Information Sciences),2013,56(5):206-218. 被引量:2
  • 8CANETTI R ,HOFIENVERGER S. Chosen ciphertext secure proxy re- encryption[ C]//Proc of the 14th ACM Conference on Computer and Communications Security. New York : ACM Press,2007 : 185-194.
  • 9邵军.代理重密码研究[D].上海:上海交通大学,2007.
  • 10WANG Hong-bing, CAO Zhen-fu, WANG Li-cheng. Multi-use and u- nidirectional identity-based proxy re-encryption schemes [ J]. Infor- mation Sciences,2010,180(20) :4042-4059.

二级参考文献2

共引文献1

同被引文献19

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部