期刊文献+

基于身份加密的装备密钥分布式生成算法 被引量:1

Military Equipment's Distributed Key-generating Algorithm for Identity-based Cryptography
下载PDF
导出
摘要 为解决身份加密体制中单一密钥生成中心易遭受攻击的问题,借鉴网络中心战"去中心化"的思想,针对Lewko-Waters身份加密协议,提出了一种分布式密钥生成算法。在算法中,主密钥由密钥生成中心和密钥隐私中心共同掌握,用户密钥在密钥生成中心监管下由分布于网络中的各密钥隐私中心共同生成,有利于增强Lewko-Waters协议密钥管理体系的抗毁性、鲁棒性。最后,在标准模型中证明了该方案在选择明文攻击下的密文不可区分性,并进行了算法性能比较分析。 According to the decentralization theory of network central warfare,we proposed a distributed private-key extraction algorithm for Lewko-Waters' s identity-based encryption because the sole key generating center of identitybased encryption is likely attacked.In this scheme,master key is in charge of both key generating center and key privacy authority.User's private key can be extracted and supervised by key generating center from a number of key privacy authorities distributing all over the network.It could be available to strengthen the survivability and robustness of key management system.Finally we proved their IND-CPA security,i.e.the indistinguishability of ciphertext under chosen plaintext attack,in the normal model and also performed a comparative analysis of the algorithm.As you can see,it can be helpful to accomplish key escrow.
出处 《计算机科学》 CSCD 北大核心 2016年第S2期355-357,397,共4页 Computer Science
基金 国家自然科学基金(61401499)资助
关键词 身份加密 分布式 密钥生成 Identity-based encryption Distributed key extraction Key escrow
  • 相关文献

参考文献2

二级参考文献29

  • 1Boneh D, Franklin M. Identity-based encryption from the weil pairing [C]//Proc of the Crypto 2001. Berlin: Springer, 2001: 213-229.
  • 2Chen L, Harrison K, Soldera D, et al. Applications of multiple trust authorities in pairing based cryptosystems [C]// Proc of the International Conference on Infrastructure Security 2002. Berlin.. Springer, 2002 : 260-275.
  • 3Goldberg K I. A distributed private-key generator for identity- based cryptography [R]. University of Waterloo, 2007.
  • 4Gentry C. Certificate-based encryption and the certificate-revocation problem [C]//Proc of Eurocrypt 2003. Berlin: Springer, 2003 : 272-291.
  • 5Al-Riyami S S, Paterson K G. Certificateless public key cryptography [C]///Proc of the 9th International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Spring, 2003 : 452-473.
  • 6Lee B, Boyd C,Dawson E, et al. Secure key issuing in id-based cryptography [C]//Proc of the 2nd Australasian Information Security Workshop. Australia: CRPIT, 2094.
  • 7Gangishetti R,Gorantla M C, Das M, et al. Threshold key issuing in identity-based cryptosystems[J]. Computer Standards Interfaces, 2007,29 (2): 260-264.
  • 8Chunxiang X,Junhui Z,Zhiguang Q. A Note on Secure Key Issuing in ID-based Cryptography [EB/OL]. http://eprint. iaer. org/2005/180.
  • 9Lee B. Unified public key infrastructure supporting both certificat.based and ID-based cryptography [C]//Proc of the 2010 International Conference on Availability, Reliability and Security. Poland: IEEE, 2010 : 54-61.
  • 10Boyen X. A tapestry of identity-Based encryption: practical fra meworks compared[J]. International Journal of Applied Cryptography, 2008,1 (1) : 3-21.

共引文献8

同被引文献14

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部