期刊文献+

高效的基于证书代理重加密方案

Efficient certificate-based proxy re-encryption scheme
下载PDF
导出
摘要 已有基于证书代理重加密方案的构造严重依赖双线性对运算,计算效率不高。针对这一问题,提出了一个高效的基于证书代理重加密方案。所提出方案的加密算法无须作双线性对运算,而其他算法至多作一次双线性对运算,因此显著提高了方案的计算性能。与现有基于证书代理重加密方案相比,该方案具有计算效率高和通信带宽低的优点。基于q-mBDHI问题和1-BDHI问题的困难性假设,该方案在随机预言模型下被严格证明满足适应性选择密文攻击下的密文不可区分安全性,即满足选择密文安全性。 The previous constructions of certificate-based proxy re-encryption are heavily dependent on the costly bilinearpairings,and thus have low computation efficiency.To solve this problem,an efficient certificate-based proxy re-encryptionscheme with bilinear pairings is developed.This new scheme significantly reduces the computation cost because it requirescomputing no bilinear pairings in the encryption algorithm and at most one bilinear pairing in other algorithms.Comparedwith the previous certificate-based proxy re-encryption schemes,it enjoys obvious advantage in both the computation efficiencyand the communication cost.In the random oracle model,the proposed scheme is formally proven to achieve indistinguishabilityagainst adaptively chosen-ciphertext attacks(i.e.,chosen-ciphertext security)under the hardness assumptionof the modified Bilinear Diffie-Hellman Inversion for q-values(q-mBDHI)problem and the1-Bilinear Diffie-HellmanInversion(1-BDHI)problem.
作者 徐海琳 陆阳 XU Hailin;LU Yang(Basic Course Department, Jiangsu Police Institute, Nanjing 210031, China;College of Computer and Information Engineering, Hohai University, Nanjing 211100, China)
出处 《计算机工程与应用》 CSCD 北大核心 2017年第14期80-86,104,共8页 Computer Engineering and Applications
基金 国家自然科学基金(No.61272542) 江苏高校优势学科建设工程资助项目 江苏警官学院科学研究项目(No.2014SJYZQ01)
关键词 代理重加密 基于证书密码体制 双线性对 选择密文安全 proxy re-encryption certificate-based cryptography bilinear pairing chosen-ciphertext security
  • 相关文献

参考文献5

二级参考文献97

  • 1李斓,冯登国,徐震.RBAC与MAC在多级关系数据库中的综合模型[J].电子学报,2004,32(10):1635-1639. 被引量:13
  • 2袁春,文振焜,张基宏,钟玉琢.基于密码学的访问控制和加密安全数据库[J].电子学报,2006,34(11):2043-2046. 被引量:11
  • 3Gentry C.Certificate-based Encryption and the Certificate Revocation Problem.Proceedings[C]//Advances in CryptologyEUROCRYPT 2003.Warsaw,Poland,2003.
  • 4Morillo P,Rafols C.Certificate-based Encryption without Randora Oracles[R].Cryptolngy ePrint Archive,2006/12.
  • 5Galindo D,Morillo P,Rdfols C.Improved Certificate-based Encryption in the Standard Model[J].Journal of System and Software,2008,81(7):1218-1226.
  • 6Al-Riyami S,Paterson K G.CBE from CL-PKE:A Genetic Construction and Efficient Schemes.Proceedings[C]//Public Key Cryptography-PKC 2005.Les Diablerets,Switzerland,2005.
  • 7Joux A A One Round Protocol for Tripartite Diffe-Hellman[C]//Proceedings Fourth International Symposium on Algorithmic Numher Theory.Leiden,Netherlands,2000.
  • 8Sakai R,Kasahara M.ID Based Cryptosystems with Pairing on Elliptic Curve[R].Cryptology ePrint Archive,2003/054.
  • 9Chen L Q,Cheng Z H.Security Proof of Sakai-Kasahara's Identity-based Encryption Scheme[R].Cryptology ePrint Archive,2005/226.
  • 10Boneh D,Boyen X.Efficient Selective-ID Secure Identity Based Encryption without Random Oracles.Proceedings[C]//Advances in Cryptology-EUROCRYPT 2004.Interlaken,Switzerland,2004.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部