期刊文献+

基于环签名的支持多PKG身份基加密方案 被引量:3

Identity-based encryption in multiple PKG environment based on ring signature
原文传递
导出
摘要 将环签名和基于身份的密码体制(identity-based encryption,IBE)相结合,构造出了一种新的、具有多个密钥生成中心(private key generator,PKG)的IBE体制,即基于环签名的多PKG身份类加密体制。并在格上构造出一种标准模型下安全的基于环签名的多PKG身份类加密方案,方案的安全性基于小整数解问题和带差错学习问题的困难性。与现有的IBE方案和其变种相比,新方案减轻了PKG的负担,更适用于庞大的组织,且具有更好的应用灵活性。 Combining ring signatures with identity-based encryption,a new identity-based encryption with multiple private key generators was constructed,that is,scheme of multiple private key generators identity-based encryption based on ring signatures. Then a multiple private key generator identity-based encryption scheme on lattice based on ring signatures in the standard model was constructed,the security of the scheme was based on the difficulty of small integer solution problems and learning with errors on lattice. Compared with the existing scheme of identity-based encryption and its variation,the new scheme decreased the burdens of private key generator which more applicable to huge system and had higher application flexibility.
作者 罗鹏 杨晓元 LUO Peng YANG Xiao-yuan(Key Laboratory of Cryptology & Information Security of APF, Engineering University of APF, Xi'an 710086, Shaanxi, China Research Institution of Information Security of APF, Engineering University of APF, Xi'an 710086, Shaanxi, China)
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2017年第6期64-68,共5页 Journal of Shandong University(Natural Science)
基金 国家自然科学基金资助项目(61572521 61272492) 武警工程大学基金课题(wjy201419)
关键词 环签名 基于身份的密码体制 lattice ring signature Identity-based encryption
  • 相关文献

参考文献1

二级参考文献15

  • 1CHARLES R,DANIEL R. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack[A].California USA,1991.433-444.
  • 2ODED R. On lattice, learning with errors, random linear codes, and cryptography[A].New York,USA,2005.84-93.
  • 3CRAIG G,CHRIS P,VINOD V. Trapdoors for hard lattices and new cryptographic constructions[A].Victoria,British Co-lumbia,Canada,2008.197-206.
  • 4SHWETA A,DAN B,XAVIER B. Efficient lattice (H) IBE in the standard model[A].French Riviera,2010.553-572.
  • 5VADIM L,CHRIS P,ODED R. On ideal Lattices and learning with errors over rings[A].French Riviera,2010.1-23.
  • 6CHRIS P,BRENT W. Lossy trapdoor functions and their applica-tion[A].Victoria,British Columbia,Canada,2008.187-196.
  • 7CHRIS P. Public-key cryptosystems from the worst-case shortest vector problem[A].Bethesda,Maryland,2009.333-342.
  • 8XAVIER B,MEI Q X,BRENT W. Dircet chosen ciphertext security from identity-based techniques[A].Alexandria,VAUSA,2005.320-329.
  • 9DAMIEN S,STEINFELD R. Making NTRU as secure as worst-case problems over ideal lattices[A].French Riviera,2011.24-47.
  • 10DAMIEN S,STEINFELD R,TANAKA K. Effcient public key en-cryption based on ideal lattices[A].{H}Springer-Verlag,2009.617-635.

共引文献5

同被引文献21

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部