期刊文献+

基于SM9的多接收者混沌密钥生成方案

Multi-Receiver Chaotic Key Generation Scheme Based on SM9
下载PDF
导出
摘要 针对在信息传输过程中保密通信涉及的密钥管理问题,结合混沌保密通信模型,文章提出一种基于SM9的多接收者混沌密钥生成方案。该方案将SM9标识密码算法密钥封装机制进行扩展,构造一个多接收者密钥封装机制,用身份信息生成和封装密钥,并将密文进行发送,只有用户集合中的接收者可以用私钥对密文进行解密获取密钥。为保障通信方能进行混沌保密通信,文章提出一个将二进制数浮点化的数据转换方法,根据参数个数实现生成多个浮点数。发送方和接收方通过对密钥进行数据转换处理实现密钥同步,为混沌保密通信奠定了基础。该方案由多接收者的身份标识信息产生密钥,保证了密钥的安全性和保密性。在随机谕言模型下,证明了文章所提方案具有良好的效率和性能,满足IND-sID-CCA安全性。 Aiming at the key management problem involved in secure communication during information transmission,combined with the chaotic secure communication model,a multi-receiver chaotic key generation scheme based on SM9 was proposed.This scheme extended the key encapsulation mechanism of the SM9 identification encryption algorithm to construct a multi-receiver key encapsulation mechanism.That is,the encapsulator selected a group of designated recipients,used their identity information to generate and encapsulate the key,and sent the ciphertext.Only the recipients in the user set can use the private key to decrypt the ciphertext to obtain the key.In order to ensure that the communication party can carry out chaotic secure communication,a data conversion method that converted binary numbers to floating points was proposed,and multiple floating point numbers could be generated according to the number of parameters.The sender and the receiver realized key synchronization through data conversion processing of the key,which caid the foundation for chaotic secure communication.This scheme realized that the key was generated from the identification information of multiple receivers,which ensured the security and confidentiality of the key.Under the random oracle model,it is proved that this scheme has good efficiency and performance,and satisfies the security of IND-sID-CCA.
作者 张雪锋 陈婷婷 苗美霞 程叶霞 ZHANG Xuefeng;CHEN Tingting;MIAO Meixia;CHENG Yexia(School of Cyberspace Security,Xi’an University of Posts and Telecommunications,Xi’an 710121,China;China Mobile Communications Corporation Research Institute,Beijing 100032,China)
出处 《信息网络安全》 CSCD 北大核心 2024年第4期555-563,共9页 Netinfo Security
基金 陕西省自然科学基础研究计划[2022JQ-600]。
关键词 SM9 密钥封装 混沌系统 IND-sID-CCA SM9 key encapsulation chaotic system IND-sID-CCA
  • 相关文献

参考文献9

二级参考文献62

  • 1史有辉,李伟生.盲签名研究综述[J].计算机工程与科学,2005,27(7):83-85. 被引量:8
  • 2廖旎焕,高金峰.广义映射混沌扩频序列及其特性分析[J].电子与信息学报,2006,28(7):1255-1257. 被引量:26
  • 3杨汝,张波.开关变换器混沌PWM频谱量化特性分析[J].物理学报,2006,55(11):5667-5673. 被引量:14
  • 4Smart N P. Efficient Key Encapsulation to Multiple Parties [C] //Lecture Notes in Computer Science. Berlin: Springer- Verlag, 2005: 208-219.
  • 5Barhosa M, Farshim P. Efficient Identity-Based Key Encapsulation to Multiple Parties [C] //Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2005: 428-441.
  • 6Weng Zhiwei, Weng Jian, He Kai, et al. New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability [C] / /Lecture Notes in Computer Science. Berlin: Spring-Verlag, 2012: 170-176.
  • 7Tseng Y M, Huang Y H, Chang H J. Privacy-preservng Multirecsiver ID-Based Encryption with Provable Security [DB/OL]. [2012-06-29]. http ://onlinelibrary. wiley, com/doi/10. 1002/dac. 2395/abstract.
  • 8Takahiro M, Goichiro H. Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited [C]// Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2013: 332-351.
  • 9Hur J, Park C, Hwang S O. Privacy-preserving Identity-based Broadcast Encryption [J] . Information Fusion, 2012, 13 (4) : 296-303.
  • 10Barth A, Boneh D, Waters B. Privacy in Encrypted Content Distribution Using Private Broadcast Encryption [C]// Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2006: 52-64.

共引文献75

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部