期刊文献+

电子邮件IBE加密研究 被引量:2

Study on IBE for Email
下载PDF
导出
摘要 提出了一种电子邮件IBE加密方案。方案采用了伪RSA密钥和IBE插件技术。伪RSA密钥是一种存放有用户标识即邮箱地址的假的RSA密钥数据。在伪RSA密钥基础上,引入自签发的伪RSA数字证书以及IBE密码模块。伪RSA数字证书的公钥是伪RSA公钥。IBE插件插入到电子邮件客户端中,当用户发送加密邮件时,IBE插件自动插入邮件加密所需的伪RSA数字证书,当用户读取加密邮件时,IBE插件自动插入邮件解密所需的用户带私钥的伪RSA数字证书;IBE密码模块将邮件客户端使用伪RSA数字证书及私钥所进行的密码运算转化为使用IBE密钥的密码运算,由此实现电子邮件的IBE加密、解密而无需对邮件客户端作任何修改。 An email IBE encryption scheme which employs pseudo-RSA keys and IBE plug-ins is proposed.A pseudo-RSA key is a kind of fake RSA key data with an identifier or email address of a user inside it.With the pseudoRSA keys,self-issued pseudo-RSA digital certificates and IBE cryptographic modules are introduced.The public key of a pseudo-RSA digital certificate is a pseudo-RSA public key.An IBE plug-in is plugged into an email client.When the user sends an encrypted email,the IBE plug-in automatically generates the pseudo-RSA digital certificates that are needed in the email encryptions.When a user reads an encrypted email,the IBE plug-in automatically generates the user's pseudo-RSA digital certificate with a private key.The IBE cryptographic module converts the cryptographic computations triggered by the email client in using the pseudo-RSA certificate and its private into the cryptographic computations with the corresponding IBE keys.As a result,emails encryptions and decryptions with IBE are achieved.The proposed scheme enables an email client to implement secure email with IBE without modifications.
作者 龙毅宏 黄强 王维 LONG Yi-hong;HUANG Qiang;WANG Wei(School of Information Engineering,Wuhan University of Technology,Wuhan 430070,China)
出处 《软件》 2018年第2期1-6,共6页 Software
基金 国家科技支撑计划项目课题(2014BAH26F03)
关键词 标识加密 伪RSA密钥 插件 安全电子邮件 Identity based encryption Pseudo-RSA key Plug-in Secure ema
  • 相关文献

参考文献4

二级参考文献15

  • 1石艳荣,贺永强.PKI和基于身份加密的比较[J].微计算机信息,2008,24(3):83-84. 被引量:8
  • 2张瑜,费文晓,余波.一种基于PKI的安全公文签名加密解决方案[J].微计算机信息,2006,22(06X):100-102. 被引量:14
  • 3刘宏伟,谢维信,喻建平.一种基于身份的无可信第三方签名方案[J].深圳大学学报(理工版),2007,24(3):257-260. 被引量:2
  • 4Shamir A.Identity-based Cryptosystems and Signature Schemes[C],LNCS196:Advances in Cryptology:Crypto' 84.Berlin:Springer,1984,47-53.
  • 5Boneh D,Franklin M.Identity based encryption from the Weil Paring[C].LNCS2139:Adnances in Cryptology:Crypto' 2001.Berlin:Springer,2001,213-229.
  • 6Boneh D,Lynn B,Shacham H.Short Signature from the Weft Paring[C].LNCS 2248:Advances in Cryptology,ASIAAP,YPT' 2001.Berlin:Springer,2001,516-532.
  • 7Diffe.W,Hellman.M.E.New Directions in Cryptology[J].IEEE Transaction on Information Theory,1976,22(6):644-654.
  • 8Hess F.Efficient Identity Based Signature Schemes Based on Parings[C].LNCS2595:Selected Area in Cryptography,SAC' 02.Berlin:Springer,2003,310-324.
  • 9Boneh D,Gentry C,Lynn B,Shacham H.Aggregate and Verifiably Encrypted Signatures from Bilinear Maps[C].LNCS2656:Advances in Cryptology-Proceeding,Eurocrypt'03.Berlin:Sptinger,2003,416-432.
  • 10李庆德.椭圆曲线密码体制的研究与实现[D].西安:西安电子科技大学,2008.

共引文献5

同被引文献16

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部