计算机学报
計算機學報
계산궤학보
CHINESE JOURNAL OF COMPUTERS
2010年
2期
335-344
,共10页
徐鹏%崔国华%雷凤宇%汤学明%陈晶
徐鵬%崔國華%雷鳳宇%湯學明%陳晶
서붕%최국화%뢰봉우%탕학명%진정
组合公钥%合谋攻击%标准模型%DecisionalBilinearDiffie-Hellman假设%基于身份加密
組閤公鑰%閤謀攻擊%標準模型%DecisionalBilinearDiffie-Hellman假設%基于身份加密
조합공약%합모공격%표준모형%DecisionalBilinearDiffie-Hellman가설%기우신빈가밀
combined public-key%conspiracy attack%standard model%Decisional Bilinear Diffie-Hellman Assumption%identity-based encryption
组合公钥方案是一种用于基于身份密码体制中生成用户加密密钥和私钥的知名方案.针对组合公钥方案存在合谋攻击的问题,通过仅扩展该方案的私钥生成过程,实现了扩展方案的抗合谋攻击性.在此基础上构建标准模型下基于Decisional Bilinear Diffie-Hellman假设可证明安全的一种新的基于身份加密方案.最后,为了说明所构新方案的实用性,分析了扩展组合公钥方案的用户加密密钥抗碰撞性;对比了新方案和同类的3个知名方案在安全性证明的归约程度方面、加解密的时间复杂度方面和密文的长度方面的性能,表明了新方案在以上3点上具有目前最优的指标.因此新方案是相对较实用的.
組閤公鑰方案是一種用于基于身份密碼體製中生成用戶加密密鑰和私鑰的知名方案.針對組閤公鑰方案存在閤謀攻擊的問題,通過僅擴展該方案的私鑰生成過程,實現瞭擴展方案的抗閤謀攻擊性.在此基礎上構建標準模型下基于Decisional Bilinear Diffie-Hellman假設可證明安全的一種新的基于身份加密方案.最後,為瞭說明所構新方案的實用性,分析瞭擴展組閤公鑰方案的用戶加密密鑰抗踫撞性;對比瞭新方案和同類的3箇知名方案在安全性證明的歸約程度方麵、加解密的時間複雜度方麵和密文的長度方麵的性能,錶明瞭新方案在以上3點上具有目前最優的指標.因此新方案是相對較實用的.
조합공약방안시일충용우기우신빈밀마체제중생성용호가밀밀약화사약적지명방안.침대조합공약방안존재합모공격적문제,통과부확전해방안적사약생성과정,실현료확전방안적항합모공격성.재차기출상구건표준모형하기우Decisional Bilinear Diffie-Hellman가설가증명안전적일충신적기우신빈가밀방안.최후,위료설명소구신방안적실용성,분석료확전조합공약방안적용호가밀밀약항팽당성;대비료신방안화동류적3개지명방안재안전성증명적귀약정도방면、가해밀적시간복잡도방면화밀문적장도방면적성능,표명료신방안재이상3점상구유목전최우적지표.인차신방안시상대교실용적.
The Combined Public-Key scheme is a famous scheme which is commonly used to gen-erate user's encryption-key and private-key in the identity-based encryption schemes.For over-coming the conspiracy attack on Combined Public-Key scheme,a new expanded scheme based on it is proposed in which the generation of private-key is an expansion of the corresponding part of combined public-key scheme.Based on the new expanded Combined Public-Key scheme,a new identity-based encryption scheme is proposed,and under the standard model it is provably secure based on Decisional Bilinear Diffie-Hellman Assumption.At last,by analyzing the collision of user's encryption-key and comparing the new proposed identity-based encryption scheme with three existed famously analogous schemes at the following three aspects:the tightness of reduc-tion in security proof,the complexity of encryption and decryption and the binary length of ci-phertext,it can be found that the new scheme is more efficient than them,so it is comparatively more useful.