期刊文献+

基于身份的抗私钥泄漏的广播加密方案 被引量:1

IDENTITY-BASED BROADCAST ENCRYPTION WITH ANTI PRIVATE KEY LEAKAGE
下载PDF
导出
摘要 侧信道攻击引起密码系统的部分信息泄漏,破坏很多密码方案的安全性。在基于身份的广播加密方案(IBBE)中,到目前为止,还没有能抵抗侧信道攻击的安全方案。基于此,提出一个抗侧信道攻击安全的基于身份的广播加密方案。使用双系统加密技术,在复合阶群静态假设下在标准模型中证明了提出方案的安全性。泄漏性能分析表明,私钥的相对泄漏率可以达到1/3。该方案具有较好的抗私钥泄漏性能。 The side channel attack causes information leakage of cryptosystems,and it also destroys the security of many cryptographic schemes. There is no security scheme can resist side channel attack in identity-based broadcast encryption( IBBE). In this paper,we propose an IBBE scheme against side channel attack. The scheme uses dual system encryption technology,and we prove the safety of the proposed scheme in the standard model based on composite order bilinear group assumptions. Leakage performance analysis shows that the private key of the relative leakage rate can reach 1 /3. The scheme has good performance of anti-private key leak.
出处 《计算机应用与软件》 CSCD 2016年第11期282-287,309,共7页 Computer Applications and Software
基金 国家自然科学基金项目(61272542) 江苏省教育厅自然科学基金项目(14KJD52006 13KJD460007) 宿迁市工业科技支撑计划项目(H201315 Z201450) 宿迁学院优秀青年骨干教师基金 宿迁学院科研基金项目(2016KY04)
关键词 弹性泄漏 双系统加密 私钥泄漏 基于身份广播加密 Leakage-resilient Dual system encryption Private key leakage Identity-based broadcast encryption
  • 相关文献

参考文献1

二级参考文献13

  • 1Fiat A and Naor M.Broadcast encryption[C].CRYPTO'93,1993,LNCS 773:480-491.
  • 2Zhang Y L,Zhang Y K,and Zhang J.An ID-based broadcast encryption scheme for collaborative design[C].International Conference on Networks Security,Wireless Communications and Trusted Computing,IEEE Computer Society,2009,NSWCTC,Vol.346:699-702.
  • 3Delerabl(e)e C,Paillier P,and Pointcheval D.Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys[C].2007,LNCS 4575:39-59.
  • 4Sharmila D S S,Sree V S,and Ragavendran G,et al..Cryptanalysis of ID-based signcryption scheme for multiple receivers[R].Cryptology ePrint Archive,Report 2008/238,2008.
  • 5Zhang L Y,Hu Y P,and Mu N B.Identity-based broadcast encryption protocol for Ad hoc networks[C].The 9th International Conference for Young Computer Scientists,IEEE Computer Society,2009,ICYCS,Vo1.194:1619-1623.
  • 6Shamir A.Identity-based cryptosyetems and signature schemes[C].CRYPTO 1984,1984,LNCS 196:47-53.
  • 7Waters B.Efficient identity based encryption without random oracles[C].EUROCRYPT 2005,LNCS 3494:114-127.
  • 8Baek J,Safavi-Naini Rt,and Susilo W.Efficient multi-receiver identity-based encryption and its application to broadcast encryption[C].PKC 2005,LNCS 3386:380-397.
  • 9Barbosa M and Farshim P.Efficient identity-based ksy encapsulation to multiple parties[C].Cryptography and Coding,10th IMA International Conference Cirencester,2005,LNCS 3796:428-441.
  • 10Waters B.Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions[C].Advances in Cryptology-CRYPTO 2009,LNCS 5677:619-636.

共引文献8

同被引文献9

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部