期刊文献+

从双线性对到多线性映射 被引量:8

From Bilinear Pairings to Multilinear Maps
下载PDF
导出
摘要 自从2000年Sakai等人利用椭圆曲线上的双线性对提出了基于身份的密钥协商方案,特别是2001年Boneh和Franklin利用双线性对实现了基于身份的加密,基于双线性对的密码体制的研究曾一度成了密码研究领域特别是公钥密码研究中的一个热点.这一研究领域所取得的研究成果在密码学研究领域创造了一个不小的奇迹.在这篇文章中,我们首先介绍什么是双线性对,然后介绍双线性对在密码中的应用,从三方一轮密钥协商到IBE,到基于属性的加密(ABE),断言(或谓词)加密(PE),函数(或功能)加密(FE),可搜索的加密等,从短签名到各种各样的签名等.我们介绍双线性对密码系统的实现现状和安全现状.双线性对可以推广到多线性映射.多线性映射可以实现双线性对所实现的所有体制,更强大的是它可以实现电路,从而可以构造任意布尔电路的断言加密和设计任意多项式电路的不可区分的混淆(iO)等.由于多线性映射的强大功能,使得基于多线性映射的密码体制的研究成为了当前的研究热点.文章第二部分介绍多线性映射定义和构造思想,以及在密码中的应用.最后我们给出一些公开问题和一些讨论. Since 2000 Sakai et al. proposed the identity based key agreement scheme using bilinear pairings on elliptic curves, especially, when Boneh and Franklin implemented the identity based encryption using bilinear pairing in 2001, the research of pairing based cryptography has become a hot topic in the field of public key cryptography. The pairing based research has achieved a great amount of results. In this paper, we firstly introduce the concept of bilinear pairing, then introduce pairing based cryptosystems, from the three party one round key agreement to identity based encryption (IBE), attribute based encryption (ABE), predicate encryption (PE), function encryption (FE) and searchable encryption, from short signature to a variety of signatures. We also introduce the current status of implementation and security of pairing. Bilinear pairing can be generalized to multilinear mapping. Multilinear maps can be used for all kinds of pairing based cryptography, a more powerful feature of multilinear mapping is that it can realize circuits. Multilinear maps can be used to design Attribute-based encryption and indistinguishability obfuscation for all circuits. Due to the strong functionality of multilinear mapping, the research of multilinear mapping based cryptosystems has become a hot research topic. In the second part of this paper, we introduce the definition, construction, and applications of multilinear mapping. Finally, we briefly discuss some open problems and interesting issues for further study in this area.
作者 张方国
出处 《密码学报》 CSCD 2016年第3期211-228,共18页 Journal of Cryptologic Research
基金 国家自然科学基金项目(61379154)
关键词 双线性对 椭圆曲线 多线性映射 混淆 bilinear pairing elliptic curve multilinear mapping lattice obfuscation
  • 相关文献

参考文献65

  • 1Boneh D,Hamburg M.Generalized identity based and broadcast encryption schemes. Advances in Cryptology-ASIACRYPT 2008 . 2008
  • 2J. Coron,T. Lepoint,M. Tibouchi.New Multilinear Maps over the Integers. Cryptology ePrint Archive 2015 162 . 2015
  • 3Garg S,Gentry C,Halevi S,et al.Attribute-based encryption for circuits from multilinear maps. Advances in Cryptology—CRYPTO’’2013 . 2013
  • 4Hohenberger S,Sahai A,Waters B.Full domain hash from (leveled)multilinear maps and identity-based aggregate signatures. Advances in Cryptology-CRYPTO’’13 . 2013
  • 5Garg,S,Gentry,C,Halevi,S,Raykova,M,Sahai,A,Waters,B.Candidate indistinguishability obfuscation and functional encryption for all circuits. FOCS 2013 . 2013
  • 6Ananth P,Gupta D,Ishai Y,et al.Optimizing obfuscation:avoiding Barrington’’s theorem. Proceedings of ACM SIGSAC Conference on Computer and Communications Security . 2014
  • 7Boneh D,Zhandry M.Multiparty key exchange,efficient traitor tracing,and more from indistinguishability obfuscation. Advances in Cryptology-CRYPTO 2014 . 2014
  • 8Naehrig, M,Niederhagen, R,Schwabe, P.New software speed records for cryptographic pairings. LATINCRYPT 2010 . 2010
  • 9Duursma I,Lee H S.Tate pairing implementation for hyperelliptic curves y2=xp+x+d. ASIACRYPT2003 . 2003
  • 10Shafi Goldwasser,Guy N. Rothblum.On Best-Possible Obfuscation. Theory of Cryptography 2007 . 2007

二级参考文献112

  • 1史扬,曹立明,王小平.Java混淆器的设计与实现[J].计算机应用,2004,24(11):63-65. 被引量:5
  • 2LeiHu,Jun-WuDong,Ding-YiPei.Implementation of Cryptosystems Based on Tate Pairing[J].Journal of Computer Science & Technology,2005,20(2):264-269. 被引量:8
  • 3Sahai A,Waters B.Fuzzy identity-based encryption[C]//Cramer R.Advances in Cryptology-EUROCRYPT 2005.Berlin,Heidelberg:Springer-Verlag,2005:457-473.
  • 4Herranz J,Laguillaumie F,Rafols C.Constant-size cipher-texts in threshold attribute-based encryption[C]//Nguyen PQ,Pointcheval D.PKC 2010,LNCS 6056:19-34.
  • 5GeAijun,Zhang Rui,Chen Cheng,et al.Threshold cipher-text policy attribute-based encryption with constant size ci-phertexts[C]//Information Security and Privacy.2012,LNCS 7372:336-349.
  • 6Agrawal S,Boyen X,Vaikuntanathan V,et al.Functional en-cryption for threshold functions (or Fuzzy IBE) from lattices[C]//Public Key Cryptography-PKC 2012.2012,LNCS7293:280-297.
  • 7SunChangxia,Ma Wenping.Secure attribute-based thresholdsignature without a trusted central authority[J].Jouml ofComputers,2012,7( 12):2899-2905.
  • 8Goyal V,Pandey 0,Sahai A,et al.Attribute-based encryp-tion for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer andCommunications Security.New York:ACM Press,2006:89Ostrovsky R,Sahai A,Waters B.Attribute-based encryptionwith non-monotonic access structures[C]//Proceedings ofthe ACM Conference on Computer and Communications Se-curity-New York:ACM Press,2007; 195-203.
  • 9Waters B.Ciphertext-policy attribute-based encryption:Anexpressive,efficient,and provably secure realization[C]//Catalano D,Catalano N.Procedings of the Public Key Cryp-tography ( PKC 2011).Berlin:Springer-Verlag,2011:53-70.
  • 10Chen Cheng,Chen Jie,Lim Hoonwei,et al.Combined pub-lic-key schemes:The case of ABE and ABS[C]//ProvSec2012.2012,LNCS 7496:53-69.

共引文献83

同被引文献39

引证文献8

二级引证文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部