登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
标准模型下基于证书的加密方案的通用构造
  • 摘要

    主要研究标准模型下基于证书的加密方案(certificate-based encryption,简称CBE)的通用构造,并给出了两个实现方案.首先,以IND-CCA2安全的公钥加密方案、IND-ID-CCA安全的基于身份的加密方案以及强一次性签名方案这3种密码学原型为组件提出了第一个CBE方案的通用构造,并在标准模型下证明了其安全性;其次,针对强一次性签名方案存在的一些问题,以强一次性消息认证码代替一次性签名方案,提出了另一个通用构造.与前者相比,第二个通用构造的性能得到了明显的优化.

  • 作者

    陆阳  李继国  肖军模  LU Yang  LI Ji-guo  XIAO Jun-mo 

  • 作者单位

    中国人民解放军理工大学通信工程学院电子信息工程系,南京,210007;河海大学计算机及信息工程学院,南京,210098/河海大学计算机及信息工程学院,南京,210098/中国人民解放军理工大学通信工程学院电子信息工程系,南京,210007

  • 刊期

    2009年6期 ISTIC PKU

  • 关键词

    基于证书的加密方案  通用构造  标准模型 

参考文献
  • [1] Gentry C. Certificate-based Encryption and the Certificate Revocation Problem. Warsaw,Poland, 2003
  • [2] Bellare M;Desai A;Pointcheval D. Relations Among Notions of Security for Public Key Encryption Schemes. Stanford,California:Stanford University, 1998
  • [3] Boneh D;Franklin M. Identity-based Encryption from the Weil Pairing. Stanford,California:Stanford University, 2001
  • [4] Canetti R;Halevi S;Katz J. Chosen-ciphertext Security from Identity-based Encryption. Interlaken,Switzerland, 2004
  • [5] Boneh D;Lynn B;Shacham H. Short Signatures from the Well Pairing. Gold Coast,Australia, 2001
  • [6] Boneh D;Katz J. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption. Stanford,California:Stanford University, 2005
  • [7] Yum D H;Lee P J. Generic Construction of Certificateless Encryption. Assisi,Italy, 2004
  • [8] Al-Riyami S;Paterson K G. CBE from CL-PKE:A Generic Construction and Efficient Schemes. Les Diablerets,Switzerland, 2006
  • [9] Galindo D;Morillo P;Ràifols C. Breaking Yum and Lee Generic Constructions of Certificateless and Certificate-based Encryption Schemes. Turin,Italy, 2006
  • [10] Kang B G;Park J H. Is It Possible to Have CBE from CL-PKE? Cryptology ePrint Archive. http://eprint,iacr.org, 2005
  • [11] Fujisaki E;Okamoto T. How to Enhance the Security of Public Key Encryption at Minimum Cost. Kamakura,Japan, 1999
  • [12] Fujisaki E;Okamoto T. Secure Integration of Asymmetric and Symmetric Encryption Schemes. Stanford,California:Stanford University, 1999
  • [13] Bellare M;Rogaway P. Random Oracles are Practical:A Paradigm for Designing Efficient Protocols. Virginia,USA, 1993
  • [14] Lu Yang;Li Jiguo;Xiao Junmo. Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. Guangdong,China, 2008
  • [15] Lu Yang;Li Jiguo;Xiao Junmo. Generic Construction of Certificate-based Encryption. Zhangjajie,China, 2008
  • [16] Yum D H;Lee P J. Identity-based Cryptography in Public Key Management. Samos Island,Greece, 2004
查看更多︾
相似文献 查看更多>>
34.204.171.108