期刊文献+

基于多线性映射的高效广播加密方案

Efficient Broadcasting Encryption Scheme Based on Multilinear Map
原文传递
导出
摘要 采用多线性映射的方法构造了适用于新场景的高效广播加密方案,以广播子群为单位通过聚合成员身份信息生成广播公钥,使公钥对子群用户长度达到定长;采用分层的临时公钥动态生成与管理结构,提高了公钥使用效率,避免了密钥管理中心(KGC)性能瓶颈的出现;在保证计算量和网络带宽占用不显著增加的同时,采用多线性映射灵活迁移计算,使广播加密的时间和空间复杂度达到最优的折中. An efficiency broadcast encryption scheme is presented based on multilinear map.In the scheme,the public key is generated by aggregating the identity information of the target broadcasting sub-group,and constant length of public key is achieved.In large application scenarios,the broadcasting public key is hierarchically generated and managed to avoid performance bottleneck of KGC.Computing burden is well allocated by flexibly transferred multilinear map to make a better balance between time and space consuming with acceptable,while the cost of computing and network bandwidth is acceptable.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2016年第2期161-164,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金面上资助项目(61272492 61572521) 陕西省自然科学基础研究计划项目(2014JM8300 2015JM6353) 武警工程大学基础研究基金资助项目(WJY201520)
关键词 多线性映射 广播加密 公钥密码体制 基于身份加密 multilinear map broadcast encryption public key encryption identity-based encryption
  • 相关文献

参考文献1

二级参考文献14

  • 1Fiat A, Naor M. Broadcast Encryption [C]//Advances in Cryptography-CRYBTO'93 Proceeding, LNCS 773. Paris: ACM, 1993: 480-491.
  • 2Zhang Y L, Zhang Y K, Zhang J. An ID-based Broadcast Encryption Scheme for Collaborative Design [C]// International Conference on Networks Security, Wireless Communications and Trusted Computing: Vol 2. Wuhan: IEEE, 2009: 699-702.
  • 3Delerablee C, Paillier P, Pointcheval D. Fully Collusion Secure Dynamic Broadcast Encryption with Constant-size Ciphertexts or Decryption Keys [C]//Pairing 2007. LNCS 4575. Tokyo: Springer-Verlag, 2007: 39-59.
  • 4Hu L, Liu Z L, Cheng X H. Efficient Identity-based Broadcast Encryption without Random Oracles [J]. Journal of Computers, 2010, 5(3): 331-336.
  • 5Yu G, Ma X, Shen Y, et al. Provable Secure Identity Based Generalized Signcryption Scheme [J]. Theoretical Computer Science, 2010, 411(40-42): 3614-3624.
  • 6Zhang L Y, Hu Y P, Mu N B. An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks [J]. IEEE Computer Society, 2009, 194: 1619-1623.
  • 7Vipul G, Omkant P, Amit S, et al. Attribute-Based Encryption for Fine-Grained Access Control for Encrypted Data [C]//ACM CCS 06: 13th Conference on Computer and Communications Security: Vol 309. Alexandria: ACM, 2006:89-98.
  • 8Goyal V, Jain A, Pandey O, et al. Bounded Ciphertext Policy Attribute-based Encryption[C]//ICALP 2008: LNCS 5126. Berlin Heidelberg: Springer-Verlag, 2008: 579-591.
  • 9Ostrovksy R, Sahai A, Waters B. Attribute Based Encryption with Non-Monotonic Access Structures [C]//CCS'2007: Vol 139. Alexandria: ACM. 2007: 195-203.
  • 10Waters B. Ciphertext-policy Attribute-based Encryption: an Expressive, Efficient, and Provably Secure Realization [C]//PKC 2011, Computer Science: LNCS 6571. Berlin Heidelberg: Springer-Verlag, 2011:53-70.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部