期刊文献+

基于双线性对的无证书代理重加密方案 被引量:1

A certificateless proxy re-encryption scheme from pairings
在线阅读 下载PDF
导出
摘要 无证书公钥密码体制是在基于身份的公钥密码体制的基础上提出的新型公钥密码体制,它避免了密钥托管问题,也不需要使用公钥证书。代理重加密可以针对同一明文,实现不同用户公钥加密的密文之间的转换,在这个过程中半可信的代理者不能获得关于消息M的任何信息。文中将无证书公钥密码体制和代理重加密结合起来,介绍了一个基于双线性对的无证书代理重加密方案,该方案在标准模型下是抗适应性选择消息攻击的。 Certificateless public key cryptography is a new type of public key cryptography which is developed from identity based cryptography. It can avoid the key escrow problem and do not need public key certificate either. Proxy re-encryption allows the proxy to transform a ciphertext under Alice' s public key into a new ciphertext under Bob' s public key on the same message, while the proxy can' t obtain any underlying plaintext. This paper combined the certificateless public key cryptography and proxy re- encryption together and proposed a certificateless proxy re-encryption scheme from pairing, which has chosen ciphertext security in standard model.
作者 崔宁 李艳琼
出处 《信息技术》 2013年第7期34-36,共3页 Information Technology
基金 国家自然科学基金资助项目(61272542)
关键词 无证书公钥密码体制 代理重加密 无证书代理重加密 certificateless public key cryptography proxy re-encryption certificateless proxy re-encryption
作者简介 崔宁(1989-),女,硕士,研究方向为密码学与信息安全。
  • 相关文献

参考文献7

  • 1Al-Riyami S S, Paterson K G. Certificateless public key cryptography [ C ]. Asiacrypt 2003. Springer-Verlag, LNCS 2894, 2003 : 452 - 473.
  • 2Diffie W, Hellman M E. New directions in cryptography[ C]. IEEE Trans. on Information Theory, 1976, 22(6) : 644 -654.
  • 3Shamir A. Identity-Based cryptosystems and signature schemes[C]. Cryptology-Crypto1984, Springer-Verlag, LNCS 196, 1985:47- 53.
  • 4Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography [ C ]. EUROCRYPT 1998. Springer-Verlag, LNCS 1403, 1998:127 - 144.
  • 5Green M, Ateniese G. Identity-based proxy re-eneryption [C]. ANCS 2007. Springer-Verlag, LNCS 4521, 2007:288 -306.
  • 6Canetti R, Hohenberger S. Chosen eiphertext secure proxy re-encryption [R/OL]. Cryptography ePrint Archive, Report 2007:171.
  • 7Park J H, Choi K Y, Hwang J Y, et al. Certificateless public key encryption in the selective-ID security model (without random ora- cles) [C]. Proc. of the Pairing 2007. Springer-Verlag , LNCS 4575, 2007:60 - 82.

同被引文献16

  • 1CHU C K, CHOW S S M, TZENG W G, et al. Key-aggregate crypto- system for scalable data sharing in cloud storage [ J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2): 468 -477.
  • 2LEE B. Unified public key infrastructure supporting both certificate- based and ID-based cryptography [ C]// ARES 2010: Proceedings of the 2010 International Conference on Availability, Reliability, and Security. Piscataway, NJ: IEEE, 2010:54-61.
  • 3DELERABLEE C. Idemity-based broadcast encryption with constant size ciphertexts and private keys [C]// Proceedings of the 2007 13th Interna- tional Conference on the Theory and Application of Cryptology and Infor- mation Security, LNCS 4833. Berlin: Springer, 21307:200-215.
  • 4BONEH D, BOYEN X. Efficient selective-id secure identity-based en- cryption without random oracles [ C] // Precedings of the 2004 Interna- tional Conference on the Theory and Applications of Cryptographic Tech- niques, LNCS 3027. Berlin: Springer, 2004:223-238.
  • 5DENG H, WU Q D, QIN B, et al. Tracing and revoking leaked cre- dentials: accountability in leaking sensitive outsourced data [ C]/! Pro- ceedings of the 2014 9th ACM Symposium on Intormation Computer and Communications Security. New York: ACM, 2014:425-434.
  • 6WANG L H, WANG L C, MAMBO M, et al. Identity-based proxy cryptosystems with revocability and hierachical confidentialities [ C]// ICICS 2010: Proceedings of the 12th International Confer- ence on Information and Communications Security, LNCS 6476. Berlin: Springer, 2010:383-400.
  • 7BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography [ C]// Proceedings of the 1998 Interna- tional Conference on the Theory and Application of Cryptographic Techniques, LNCS 1403. Berlin: Springer, 1998:127-144.
  • 8CHU C K, TZENG W G. Identity-based proxy re-encryption without random oracles [ C]// ISC 2007: Proceedings of the 10th Interna- tional Conference on Information Security, LNCS 4779. Berlin: Springer, 2007:189 - 202.
  • 9SRINIVASAN A, RANGAN C P. Certificateless proxy re-encryp- tion without pairing: revisited [ C]// SCC 2015: Proceedings of the 3rd International Workshop on Security in Cloud Computing. New York: ACM, 2015:41-52.
  • 10LIANG K, LIU J K, WONG D S, et al. An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing [ C]// Proceedings of the 2014 19th European Symposium on Research in Computer Security, LNCS s712. Ber- lin: Springer, 2014:257-272.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部