期刊文献+

格上基于身份的广播加密方案 被引量:1

Identity-based broadcast encryption based on lattice
下载PDF
导出
摘要 针对Wang等(WANG J,BI J.Lattice-based identity-based broadcast encryption.https://eprint.iacr.org/2010/288.pdf.)在随机预言机下提出的格基广播加密方案安全性较低且实用性较差的问题,利用盆景树扩展控制算法和一次签名算法构造了一个标准模型下基于格上错误学习(LWE)问题的身份基广播加密方案。首先利用一个编码函数替换随机预言机,将方案置于标准模型下;然后运行盆景树扩展控制算法生成用户的私钥和广播公钥;最后在加密阶段加入一次签名算法,提高方案的安全性。分析表明,相对于已有同类方案,新方案安全性较高达到了适应性攻击下选择密文安全(IND-ID-CCA)且方案具有动态扩展特性,能够通过用户身份矩阵的伸缩来实现用户的添加或删除,因此实用性较强。 Focusing on the issue of low security and poor practicability in the lattice-based broadcast encryption scheme proposed by Wang et al.( WANG J,BI J. Lattice-based identity-based broadcast encryption. https: / / eprint. iacr. org /2010 /288. pdf.) in the random oracle,an identity-based broadcast encryption shceme based on Learning With Errors( LWE) in the standard model was constructed by expanding control algorithm of bonsai tree and one-time signature algorithm. Firstly,the random oracle was replaced by a coding function to make the scheme be in the standard model. Then,the bonsai tree expanding control algorithm was used to generate the private keys of users and public key. Finally,the one-time signature algorithm was added to improve the security. Analysis shows that compared with existed similar schemes,the scheme gets stronger security,achieves adaptively indistinguishable-chosen ciphertext attack security with dynamic extension,which means the users can be added or deleted by expanding or contracting the identity matrix. Hence it has strong practicability.
出处 《计算机应用》 CSCD 北大核心 2016年第4期956-961,共6页 journal of Computer Applications
基金 国家自然科学基金资助项目(61272492) 陕西省自然科学基础研究计划项目(2015JM6353 2014JM8300)~~
关键词 身份基广播加密 错误学习 盆景树扩展控制算法 一次签名算法 适应性攻击下选择密文安全 identity-based broadcast encryption Learning With Error(LWE) bonsai tree expanding control algorithm one-time signature algorithm adaptively indistinguishable-chosen ciphertext attack security
  • 相关文献

参考文献16

  • 1AMOS F,MONI N.Broadcast encryption[C]//CRYPTO 1993:Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology.Berlin:Springer,1994:480-491.
  • 2DAN B,CRAIG G,BRENT W.Collusion resistant broadcast encryption with short ciphertexts and private keys[C]//CRYPTO 2005:Proceedings of the 25th Annual International Cryptology Conference on Advances in Cryptology,LNCS 3621.Berlin:Springer,2005:258-275.
  • 3ADI S.Identity-based cryptosystems and signature schemes[C]//Proceedings of CRYPTO 1984 on Advances in Cryptology,LNCS 196.Piscataway,NJ:IEEE,1984:47-53.
  • 4CéCILE D.Identity-based broadcast encryption with constant size ciphertexts and private keys[C]//ASIACRYPT 2007:Proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security,LNCS 4833.Piscataway,NJ:IEEE,2007:200-215.
  • 5DANIELE M,ODED R.Lattice-based cryptography[M]//BERNSTEIN D J,BUCHMANN J,DAHMEN E.Post Quantum Cryptography.Berlin:Springer,2009:47-91.
  • 6WANG J,BI J.Lattice-based identity-based broadcast encryption[EB/OL].[2015-02-10].https://eprint.iacr.org/2010/288.pdf.
  • 7LI X,YANG B,GUO Y,et al.Provably secure group based broadcast encryption on lattice[J].Journal of Information & Computational Science,2011,8(2):179-193.
  • 8张伟仁,胡予濮,杨晓元.格上新的身份类广播加密方案[J].北京邮电大学学报,2012,35(6):112-115. 被引量:4
  • 9ADELA G.Anonymous lattice-based broadcast encryption[C]//ICT-EurAsia 2013:Proceedings of the 2013 International Conference on Information and Communication Technology,LNCS 7804.Berlin:Springer,2013:353-362.
  • 10BENOIT L,PATERSON K G,QUAGLIA E A.Anonymous broadcast encryption:adaptive security and efficient constructions in the standard model[C]//PKC 2012:Proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography,LNCS 7293.Berlin:Springer,2012:206-224.

二级参考文献4

  • 1邱慧敏,杨义先,钮心忻.无线传感器网络中广播通信的安全协议设计[J].北京邮电大学学报,2006,29(5):103-106. 被引量:7
  • 2Wang Jin,Bi Jingguo.Latticebased identitybased broadcast encryption \[EB/OL\]. http: ∥eprint.iacr.org/,2010/288 . 2010
  • 3Li Ximing,Yang Bo,Guo Yubin, et al.Provably secure group based broadcast encryption on lattice \[J\][].Journal of Information & Computational Science.2011
  • 4Cash D,Hofheinz D,Kiltz E, et al.Bonsai trees, or how to delegate a lattice basis \[C\][].Proc of Eurocrypt.2010

共引文献3

同被引文献9

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部