计算机工程
計算機工程
계산궤공정
COMPUTER ENGINEERING
2014年
7期
103-107
,共5页
广播加密%匿名%合数阶双线性群%基于身份的匿名加密%基于身份的匿名广播加密%静态假设
廣播加密%匿名%閤數階雙線性群%基于身份的匿名加密%基于身份的匿名廣播加密%靜態假設
엄파가밀%닉명%합수계쌍선성군%기우신빈적닉명가밀%기우신빈적닉명엄파가밀%정태가설
broadcast encryption%anonymous%bilinear group of compositing order%anonymous Identity-based Encryption(IBE)%anonymous Identity-based Broadcast Encryption(IBBE)%static assumption
目前基于身份的广播加密方案多为非匿名方案,安全性较差。为此,将基于身份的匿名加密定义拓展为基于身份的匿名广播加密,在Zhang等人方案(Mathematical and Computer Modelling,2012, No.1)的基础上,结合合数阶双线性群的性质,并基于3个静态假设,构造一种基于身份的匿名广播加密方案。该方案的安全性不依赖于随机预言机,其中的密文和私钥均为固定长度,安全性可达到适应性安全。同时方案具有匿名性,敌手不能通过密文得到接收者的任何身份信息,从而保护了接收者的隐私。通过分析方案的效率验证了其正确性和安全性,并与同类方案进行比较,表明该方案更具优势。
目前基于身份的廣播加密方案多為非匿名方案,安全性較差。為此,將基于身份的匿名加密定義拓展為基于身份的匿名廣播加密,在Zhang等人方案(Mathematical and Computer Modelling,2012, No.1)的基礎上,結閤閤數階雙線性群的性質,併基于3箇靜態假設,構造一種基于身份的匿名廣播加密方案。該方案的安全性不依賴于隨機預言機,其中的密文和私鑰均為固定長度,安全性可達到適應性安全。同時方案具有匿名性,敵手不能通過密文得到接收者的任何身份信息,從而保護瞭接收者的隱私。通過分析方案的效率驗證瞭其正確性和安全性,併與同類方案進行比較,錶明該方案更具優勢。
목전기우신빈적엄파가밀방안다위비닉명방안,안전성교차。위차,장기우신빈적닉명가밀정의탁전위기우신빈적닉명엄파가밀,재Zhang등인방안(Mathematical and Computer Modelling,2012, No.1)적기출상,결합합수계쌍선성군적성질,병기우3개정태가설,구조일충기우신빈적닉명엄파가밀방안。해방안적안전성불의뢰우수궤예언궤,기중적밀문화사약균위고정장도,안전성가체도괄응성안전。동시방안구유닉명성,활수불능통과밀문득도접수자적임하신빈신식,종이보호료접수자적은사。통과분석방안적효솔험증료기정학성화안전성,병여동류방안진행비교,표명해방안경구우세。
Most of the current broadcast encryption schemes are not anonymous. Aiming at this problem, a new anonymous Identity-based Broadcast Encryption(IBBE) scheme is constructed. It extends the definition of anonymous Identity-based Encryption(IBE) to anonymous IBBE. Combining with Zhang’s scheme(Mathematical and Computer Modelling, 2012, No.1), the new anonymous IBBE scheme is based on three static assumptions and a bilinear group of composition order. Results show that the scheme’s security does not rely on the random oracles. There is a constant ciphertexts and private key length in the scheme. Most importantly, it achieves an adaptive security and anonymous property. The adversary cannot get recipient’s any identity information, so receiver’s privacy can be protected well. Finally, the efficiency of the scheme is analyzed and the correctness and security are verified. Then, the performance of this scheme is compared with similar schemes, and result shows that the proposed scheme has better performance.