期刊文献+

基于证书代理重加密方案

Certificate-based proxy re-encryption scheme
下载PDF
导出
摘要 代理重加密方案使一个半可信的代理者将用委托者的公钥加密的密文转换成用受委托者公钥加密的密文,在转换其间代理者不能获得相关的明文信息。基于证书的公钥密码体制克服了传统公钥密码体制和基于身份密码体制的缺点与不足,为此将证书加密体制与代理重加密结合起来,提出了一个在随机预言模型下的适应性选择密文安全的基于证书代理重加密方案。 The proxy re-encryption allows a semi-trust proxy to transform a ciphertext which is encrypted under the delegator's public key into delegatee's public key,during the transformation,the proxy can't learn any information about the plaintext. The certificate-based encryption overcomes the defect of the traditional public key encryption and identity-based encryption. This paper combines the certificate-based encryption and the proxy re-encryption,proposes a certificate-based proxy re-encryption scheme,which is proved secure against the chosen ciphertext security in the random oracle.
出处 《信息技术》 2015年第4期148-152,共5页 Information Technology
关键词 代理重加密 证书加密 随机预言模型 proxy re-encryption certificate-based encryption random oracle
  • 相关文献

参考文献10

  • 1Shamir A.Identity-Based Cryptosystems and Signature Schemes[C].CRYPTO 1984,LNCS 196.Springer,Heidelberg,1985:47-53.
  • 2Gentry C.Certificate-Based Encryption and the Certificate Revocation Problem[C].EUROCRYPT 2003,LNCS 2656.Springer,Heidelberg,2003:272-293.
  • 3Blaze M,Bleumer G,Strauss M.Divertible Protocols and Atomic Proxy Cryptography[C].EUROCRYPT 1998,LNCS 1403.Springer,Heidelberg,1998:127-144.
  • 4Ateniese G,Fu K,Green M,et al.Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage[J].ACM Transaction on Information and System Security.2006,9(1):1-30.
  • 5Green M,Ateniese G.Identity-Based Proxy Re-Encryption[C].ACNS 2007,LNCS 4521.Springer,Heidelberg,2007:288-306.
  • 6Tang Q.Type-Based Proxy Re-Encryption and Its Construction[C].INDOCRYPT 2008,LNCS 5365.Springer,Heidelberg,2008:130-144.
  • 7Boneh D,Franklin M.Identity-Based Encryption from the Weil Pairing[C].CRYPTO 2001,LNCS 2139.Springer,Heidelberg,2001:213-229.
  • 8Boneh D,Boyen X.Efficient Selective-ID Secure Identity-Based Encryption without Random Oracles[C].EUROCRYPT 2004,LNCS 3027.Springer,Heidelberg 2004:223-238.
  • 9张维纬,张茹,刘建毅,钮心忻,杨义先.高效的选择密文安全的单向代理重加密方案[J].通信学报,2013,34(7):87-97. 被引量:9
  • 10Lu Y.An Efficient and Provably Secure Certificate-Based Encryption Scheme[C].ICTMF 2011,LNCS 164.Springer,Heidelberg,2011:54-61.

二级参考文献22

  • 1BLAZE M, BLEUMER G; STRAUSS M. Divertible protocols and atomic proxy cryptography[A]. E:JROCRYPT'98, International Con- fe:'ence on the Theory and Application of Cryptographic Techniqtms[C]. Espoo, Finland, 1998.127-144.
  • 2ATENIESE G: FU K, GREEN M, et al. Improved proxy re-eneryption schemes with applications to secure dislributed storage[J]. ACM Transac- tions on Information System Security, 2006, (9): 1-30.
  • 3SHAO J, LIU P, ZHOU Y. Achieving key privacy without losing CCA security in proxy re-eneryption[J]. The Journal of Systems and Soil- ware, 2012, 85:655-665.
  • 4TABAN G, CARDENAS A A, GLIGOR V D. Towards a secure and interoperable DRM architecture[A]. Proceedings of the ACM Work- shop on Digital Rights Management[C]. New York, USA, 2006. 69-78.
  • 5LEE S, HEEJIN P, JONG K. A secure and mutual-profitable DRM interoperability scheme[A]. Proceedings of the IEEE Symposium on Computers and Communications[C]. Riccione, Italy, 2010. 75-80.
  • 6SHAO J, CAO Z, LIANG X H, et at'. Proxy re-encryption with key- word search[J]. Information Sciences, 2010, 180(4):2576-2587.
  • 7WANG X A, HUANG X Y, YANG X Y, et al. Further observation on proxy re-encryption with keyword search[J]. The Journal of Systems and Software, 2012, 85:643-654.
  • 8CANETT1 R, HOHENBERGER S. Chosen-ciphertext secure proxy re-encryption[A]. Proceedings of the 14th ACM Conference on Computer and Communications Security[C]. Alexandria, VA, USA, 2007. 185-194.
  • 9CANETTI R, HALEVI S, KATZ J. Chosen-ciphertext security from identity-based encryption[A]. EUROCRYPT'04[C]. Alexandria, VA, USA, 2007. 185-194.
  • 10LIBERT B, VERGNAUD D. Unidirectional chosen-ciphertext secure proxy re-encryption[J]. IEEE transactions on Information theory, 2011, 57(3):1786-1802.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部