期刊文献+

有效的标准模型下格上基于身份的代理重加密 被引量:7

Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model
下载PDF
导出
摘要 代理重加密在云计算环境下的密文共享等方面起着重要的作用。目前格上基于身份的代理重加密方案都是随机预言机模型的。针对这个问题,该文构造了一个高效的标准模型下格上基于身份的代理重加密方案。在方案中,用户身份仅仅被映射为一个向量,使得用户私钥的尺寸较短。该方案具有双向性,多次使用性等性质,并且在LWE困难假设下是适应性选择身份CPA安全的。 Proxy re-encryption plays an important role for encrypted data sharing and so on in cloud computing.Currently,almost all of the constructions of identity-based proxy re-encryption over lattice are in the random oracle model.According to this problem,an efficient identity-based proxy re-encryption is constructed over lattice in the standard model,where the identity string is just mapped to one vector and getting a shorter secret key for users.The proposed scheme has the properties of bidirectional,multi-use,moreover,it is semantic secure against adaptive chosen identity and chosen plaintext attack based on Learning With Errors(LWE)problems in the standard mode.
作者 江明明 郭宇燕 余磊 宋万干 魏仕民 JIANG Mingming;GUO Yuyan;YU Lei;SONG Wangan;WEI Shimin(School of Computer Science and Technology,Huaibei Normal University,Huaibei 235000,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2019年第1期61-66,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60573026) 安徽省自然科学基金(1708085QF154) 安徽省高校自然科学基金(KJ2016A627 KJ2018A0398 KJ2017ZD32) 安徽省高校人才计划项目(gxyq2017154)~~
关键词 代理重加密 格密码 高斯抽样 基于身份的密码学 Proxy re-encryption Lattice cryptography Gaussian sampling Identity-based cryptography
  • 相关文献

参考文献2

二级参考文献15

  • 1Tal Garfinkel etc.When Virtual is Harder than Real:Security Challenges in Virtual Machine Based Computing Environments[]..
  • 2Jenni Susan Reuben.A Survey on Virtual Machine. http://www.tml.tkk.fi/Publications/C/25/papers/Reuben_final.pdf .
  • 3http://en.wikipedia.org/wiki/Amazon_Ela stic_Compute_Cloud .
  • 4J.Brodkin.“Gartner:Seven cloud-computing security risks”. http://www.networkworld.com/news/2008/070208-cloud.html . 2008
  • 5Samuel T.King etc.SubVirt:Implementing malware with virtual machines. http://www.eecs.umich.edu/~pmchen/papers/king06.pdf .
  • 6.Cloud computing[]..
  • 7Galen Gruman.What is cloud computing?[]..
  • 8Mladen Vouk,Sam Averitt etc.Powered byVCL-Using Virtual Computing Laboratory(VCL)[].Procnd International Conference on Virtual Computing(ICVCI).2008
  • 9Patrick DREHERa,Mladen A.VOUK,,Eric SILLS,Sam AVERITT.Cost Effective Cloud Computing Using VCL. http://vcl.ncsu.edu/papers-publications .
  • 10Radu Sion.Query Execution Assurance for Outsourced Databases[].International Conference on Very Large Data Bases(VLDB).2005

共引文献19

同被引文献33

引证文献7

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部