期刊文献+

具有多接收者的抗泄露匿名密钥封装机制

Leakage-Resilient Key Encapsulation Mechanism with Anonymity and Multi-Receiver
下载PDF
导出
摘要 基于证书的密码体制在继承传统公钥基础设施和身份基密码体制优势的同时,避免了证书管理和密钥托管等不足.为了向基于证书的密钥封装机制提供匿名性和抗泄露攻击的能力,本文提出具有多接收者的抗泄露匿名密钥封装机制的形式化定义及抵抗泄露攻击的安全模型,并给出具体的实例化构造;同时基于判定的Diffie-Hellman假设的困难性,对上述实例泄露容忍的选择明文攻击安全性进行了证明.与现有相关构造相比,本文方案不仅具有匿名性、泄露容忍性和多接收者等更优的性能,而且当为多个用户生成封装密钥时具有更优的计算效率. Certificate-based cryptography combines the best aspects of identity-based encryption(implicit certification management)and public key encryption(no key escrow).To provide the ability of broadcast communication and leakage resilience for the certificate-based key encapsulation mechanism,a new cryptographic primitive,called leakage-resilient key encapsulation mechanism with anonymity and multi-receiver,is proposed in this paper;the formal definition and the leakage-resilient security model of our proposal are also described.The concrete construction of the above cryptographic primitive is created,and the corresponding leakage-resilient chosen-plaintext attacks security is proved based on the hardness of the decisional Diffie-Hellman assumption.The corresponding analysis shows that our scheme has better performance in anonymity,leakage resilience,and multi-receiver and so on;also,better computational efficiency can be achieved when generating encapsulation keys for multiple users.
作者 周彦伟 韩宇 徐然 王佳 ZHOU Yan-wei;HAN Yu;XU Ran;WANG Jia(School of Computer Science,Shaanxi Normal University,Xi’an,Shaanxi 710119,China;Department of Information Construction and Management,Shaanxi Normal University,Xi’an,Shaanxi 710119,China)
出处 《电子学报》 EI CAS CSCD 北大核心 2023年第12期3431-3436,共6页 Acta Electronica Sinica
基金 国家自然科学基金(No.62272287)。
关键词 基于证书密码体制 密钥封装机制 多接收者 泄露容忍 certificate-based cryptography key encapsulation mechanism multi-receiver leakage resilience
  • 相关文献

参考文献4

二级参考文献51

  • 1黄欣沂,张福泰,伍玮.一种基于身份的环签密方案[J].电子学报,2006,34(2):263-266. 被引量:17
  • 2Cramer R, Shoup V. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 2003,33(1): 167-226. [doi: 10.1137/S0097539702403773].
  • 3Kurosawa K, Desmedt Y. A new paradigm of hybrid encryption scheme. In: Franklin M, ed. Proc. of the CRYPTO 2004. LNCS 3152, Berlin, Heidelberg: Springer-Verlag, 2004. 426-442.
  • 4Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In: Denning D, Pyle R, Ganesan R, eds. Proc. of the 1st ACM Conf. on Computer and Communication Security. New York: ACM Press, 1993.62-73. [doi: 10.1145/168588.168596].
  • 5Okamoto T, Pointcheval D. REACT: Rapid enhanced-security asymmetric cryptosystem transform. In: Naccache D, ed. Proc. of the CT-RSA 2001. LNCS 2020, Berlin, Heidelberg: Springer-Verlag, 2001.159-174.
  • 6Shoup V. Using hash functions as a hedge against chosen ciphertext attack. In: Preneel B, ed. Proc. of the EUROCRYPT 2000. LNCS 1807, Berlin, Heidelberg: Springer-Verlag, 2000. 275-288,.
  • 7Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes. In: Wiener M, ed. Proc. of the CRYPTO'99. LNCS 1666, Berlin, Heidelberg: Springer-Verlag, 1999. 537-554.
  • 8Abe M, Gennaro R, Kurosawa K, Shoup V. Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. In: Cramer R, ed. Proc. of the EUROCRYPT 2005. LNCS 3494, Berlin, Heidelberg: Springer-Verlag, 2005. 128-146. [doi: 10.1007/s00145-007-9010-x].
  • 9Bjorstad TE, Dent AW. Building better signcryption schemes with tag-KEMs. In: Yung M, et al, eds. Proc. of the PKC 2006. LNCS 3958, Berlin, Heidelberg: Springer-Verlag, 2006.491-507. [doi: 10.1007/11745853_32].
  • 10Yoshida M, Fujiwara T. On the security of Tag-KEM for signcryption. Electronic Notes in Theoretical Computer Science, 2007, 171(1):83-91. [doi: 10.1016/j.entcs.2006.11.011].

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部