期刊文献+

无双线性对的可撤销的无证书加密 被引量:2

Revocable Certificateless Encryption Without Bilinear Pairing
下载PDF
导出
摘要 无证书公钥密码体制既克服了基于身份的公钥体制的密钥托管问题,又不需要像传统公钥体制那样管理公钥证书,是目前的研究热点.而对于任何公钥密码体制,如何撤销一个用户是必须解决的问题.然而,目前对无证书系统的撤销问题还缺乏理想的解决方案.本文基于无证书加密,提出了1种高效的无证书系统的撤销方法,构造了1个具体的可撤销的无证书加密方案.该方案不需要计算双线性对,密钥的更新在公共信道上就可以完成,所以我们的方案在效率方面远远优于现有方案.在安全性方面,本文的方案达到了CCA2安全. Certificateless public key cryptosystem,without certificate and key escrow problem, has received wide attention. For a public key cryptosystem,how to revoke a user is a necessary problem to be addressed. However,there still lacks good method to solve the revocation problem in certificateless setting. Based on certificateless encryption, this paper presents a revocation method by constructing a revocable certificateless encryption scheme. Our scheme does not need any bilinear pairing, and the key-update is done via public channels. So, our scheme is more efficient than the existing solutions. The new scheme reaches CCA2 security.
作者 孙银霞 刘静
出处 《南京师大学报(自然科学版)》 CAS CSCD 北大核心 2015年第4期52-56,共5页 Journal of Nanjing Normal University(Natural Science Edition)
基金 江苏省自然科学基金青年基金(BK20130908) 江苏省高校自然科学基金(13KJD520006) 国家自然科学基金(61170298) 南京师范大学科研基金(2012119XGQ181)
关键词 撤销 无证书签名 无双线性对 revocable, certificateless encryption, without bilinear pairing
  • 相关文献

参考文献14

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [C]//LNCS 196, Crypto 1984, Berlin:Springer-Verlag, 1984:47-53.
  • 2AL-RIYAMI S S, PATERSON K. Certificateless public key cryptography [ C ]//LNCS 2894, Asiacrypt 2003, Berlin : Springer- Verlag, 2003 : 452-473.
  • 3MICALI S. Novomodo: scalable certificate validation and simplified PKI management [C]//Proceedings of 1st annual PKI research workshop 2002, Gaithersburg : NIST, 2002 : 15-25.
  • 4BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing [ C ]//LNCS 2139, CRYPTO 2001, Berlin : Springer- Verlag, 2001 : 213-229.
  • 5BOLDYREVA A, GOYAL V, KUMAR V. Identity-based encryption with efficient revocation [C]//Proceeding of CCS 2008, New York : ACM Press, 2008 : 417-426.
  • 6LIBERT B, QUISQUATER J J. Efficient revocation and threshold pairing based cryptosystems [C]//Proceeding of PODC 2003, New York : ACM Press, 2003 : 163-171.
  • 7LIBERT B, VERGNAUD D. Adaptive-ID secure revocable identity-based encryption[C]//LNCS 5473, CT-RSA 2009, Berlin: Springer-Verlag, 2009:1-15.
  • 8TSENG Y M, TASI T T. Efficient revocable ID-based encryption with a public channel [J ]. The computer journal, 2012,55 (4) : 475-486.
  • 9TSAI T T, TSENG Y M, WU T Y. Revocable ID-based signature scheme with batch verifications [C]//Proeeeding of IIHMS 2012, Piraeus : IEEE, 2012 : 49-54.
  • 10TSAI T T, TSENG Y M, WU T Y. Provably secure revocable ID-based signature in the standard model [J]. Security and communication networks, 2013,6(10) : 1 250-1 260.

同被引文献9

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部