期刊文献+

基于身份的门限多代理者的代理重加密方案 被引量:5

Identity-based proxy re-encryption with threshold multi-proxy
在线阅读 下载PDF
导出
摘要 提出一个有效的基于身份的门限多代理者的代理重加密方案。传统的代理重加密方案中代理者通常都是指独立的个体,而在此处代理者将是一个群体(n个人),只有当其中至少t个人同时参与时,才能进行有效地代理。同时还证明了此方案在标准模型下是selective ID-IND-CCA安全的。 An efficient ID-based proxy re-encryption scheme with threshold multi-proxy is proposed. Unlike the previous proxy re-encryption schemes, the proxy in this proposal is a group of entities instead of a single entity, only t or more entities out of n entities in the group can realize the functionality of the proxy. Furthermore, this proposal is selective ID-IND-CCA secure in the standard model.
出处 《黑龙江大学自然科学学报》 CAS 北大核心 2010年第2期151-156,共6页 Journal of Natural Science of Heilongjiang University
基金 国家自然科学基金资助项目(60972034 60970110)
关键词 代理重加密 门限多代理者 基于身份的密码 proxy re-encryption threshold multi-proxy ID-based encryption
  • 相关文献

参考文献19

  • 1BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography[ C]. EUROCRYPT 1998, LNCS. Berlin:Springer, 1998,1403 : 127 - 144.
  • 2CANETTI R, HOHENBERGER S. Chosen - ciphertext secure proxy re - encryption[C]. ACM CCS 2007. Alexandria, Virginia, 2007 : 185 - 194.
  • 3CHU C, TZENG W. Identity - based proxy re - encryption without random oracles [ C ]. ISC 2007, LNCS. Berlin : Springer,2007,4779 : 189 - 202.
  • 4GREEN M, ATENIESE G. Identity - based proxy re - encryption [ C ]. ACNS 2007, LNCS. Berlin : Springer,2007,4521:288 - 306.
  • 5IVAN A,DODIS Y. Proxy cryptography revisited[ C]. NDSS 2003, San Diego, California:The lntemet Society,2003.
  • 6LIBERT B, VERGNAUD D. Unidirectional chosen -ciphertext secure proxy re -encryption [ C ]. PKC 2008, LNCS. Berlin:Springer,2008,4939 : 360 - 379.
  • 7SHAO J, CAO Z. CCA - secure proxy re - encryption without pairings [ C ]. PKC 2009, LNCS. Berlin : Springer,2009,5443:357 - 376.
  • 8SHAO J, XING D, CAO Z. Analysis of CCA secure unidirctional ID- based PRE scheme[ R]. Shanghai:Shanghai JiaoTong University,2008.
  • 9WENG J, DENG R H, LIU S, et al. Chosen - ciphertext secure proxy re - encryption schemes without pairings [ C ]. CANS 2008, LNCS. Berlin : Springer,2008,5339 : 1 - 17.
  • 10DESMEDT Y, FRANKEL Y. Threshold cryptosystems[ C ]. CRYPTO 1989, LNCS. Berlin : Springer, 1989,435 : 307 - 315.

同被引文献11

引证文献5

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部