针对机会网络的自组织性、开放性、连通性差等特点以及现有的基于上下文的路由协议中可能存在的隐私泄露等安全问题,提出了一种基于模糊身份密码学的身份认证方案F-ONIAS(Identity Authentication Scheme in Opportunistic Network Base...针对机会网络的自组织性、开放性、连通性差等特点以及现有的基于上下文的路由协议中可能存在的隐私泄露等安全问题,提出了一种基于模糊身份密码学的身份认证方案F-ONIAS(Identity Authentication Scheme in Opportunistic Network Based on Fuzzy-IBE)。该方案通过一个无需实时在线的PKG为用户颁发私钥来解决机会网络中因节点无法实时连通而导致的传统非对称密码学方案不适用的问题。同时,将节点的生物信息作为身份标识,避免了传统身份密码学中身份信息可能被伪造而带来的安全隐患。仿真实验表明,在存在恶意节点的网络环境下,本方案比现有的经典路由协议方案拥有更高的报文投递率和更低的路由开销率,并且未对报文平均时延造成明显影响。展开更多
Two new constructions of chosen-ciphertext secure fuzzy identity-based encryption (fuzzy-IBE) schemes without random oracle are proposed. The first scheme combines the modification of chosen-plaintext secure Sahai a...Two new constructions of chosen-ciphertext secure fuzzy identity-based encryption (fuzzy-IBE) schemes without random oracle are proposed. The first scheme combines the modification of chosen-plaintext secure Sahai and Waters' "large universe" construction and authenticated symmetric encryption, and uses con- sistency checking to handle with ill-formed ciphertexts to achieve chosen-ciphertext security in the selective ID model. The second scheme improves the efficiency of first scheme by eliminating consistency checking. This improved scheme is more efficient than existing chosen-ciphertext secure fuzzy-IBE scheme in the standard model.展开更多
文摘针对机会网络的自组织性、开放性、连通性差等特点以及现有的基于上下文的路由协议中可能存在的隐私泄露等安全问题,提出了一种基于模糊身份密码学的身份认证方案F-ONIAS(Identity Authentication Scheme in Opportunistic Network Based on Fuzzy-IBE)。该方案通过一个无需实时在线的PKG为用户颁发私钥来解决机会网络中因节点无法实时连通而导致的传统非对称密码学方案不适用的问题。同时,将节点的生物信息作为身份标识,避免了传统身份密码学中身份信息可能被伪造而带来的安全隐患。仿真实验表明,在存在恶意节点的网络环境下,本方案比现有的经典路由协议方案拥有更高的报文投递率和更低的路由开销率,并且未对报文平均时延造成明显影响。
基金the National High Technology Research and Development Program (863) of China(No. 2006AA12A106)
文摘Two new constructions of chosen-ciphertext secure fuzzy identity-based encryption (fuzzy-IBE) schemes without random oracle are proposed. The first scheme combines the modification of chosen-plaintext secure Sahai and Waters' "large universe" construction and authenticated symmetric encryption, and uses con- sistency checking to handle with ill-formed ciphertexts to achieve chosen-ciphertext security in the selective ID model. The second scheme improves the efficiency of first scheme by eliminating consistency checking. This improved scheme is more efficient than existing chosen-ciphertext secure fuzzy-IBE scheme in the standard model.