期刊文献+

基于Ad hoc网的身份型广播加密方案 被引量:5

Identity-based Broadcast Encryption Based on Ad hoc Networks
在线阅读 下载PDF
导出
摘要 考虑到动态Ad hoc网的安全性及效率难以兼顾的问题,提出一种有效的基于动态网络的广播加密方案,并给出严格的安全性证明。该方案建立在标准模型下,当用户之间通过广播方式传递信息时,采用双线性对运算对任意数量无状态用户可实现完全抗串谋攻击。在密钥提取过程中,通过引入身份随机数并利用撤销用户身份集合进行加密,使得新用户可以动态加入群却不改变加解密密钥和密文的长度,其大小不超过O(1)。同时,所有有效操作过程在O(r)时间内完成,不依赖于用户总人数m,从而大大提高了算法的传输及存储效率。安全性验证表明,该方案在GD-DHE假设下是抗静态敌手IND-IN-CPA安全的。 To give concurrent consideration in the security and efficiency,a novel identity-based broadcast encryption was developed for ad hoc networks.Through security analysis,the correctness and effectiveness of the above methods were verified.Based on the standard model,the bilinear maps were introduced to achieve the collusion-secure for arbi-trarily large of users during the broadcast communication.In the process of extract,new users could join dynamically without modification of user decryption keys nor ciphertext size by using ID,and its size not much than O(1).Simulta-neously,all efficiency measures were completed in O(r) time but not depended on the number of user m,thus the effi-ciency of transmission and storage was improved.Proof of security shows that the proposed scheme is IND-IN-CPA se-cure against static adversaries in the standard model under the(t,n)-GDDHE intractability assumption.
出处 《计算机科学》 CSCD 北大核心 2011年第2期46-49,共4页 Computer Science
基金 973项目(2007CB311201) 国家自然科学基金项目(60970119)资助。
关键词 动态Adhoc网 可证明安全 标准模型 完全抗串谋攻击 Mobile Ad hoc networks Provably secure Standard model Full collusion-secure
  • 相关文献

参考文献13

  • 1Baek J,Safavi-Naini R,Susilo W.Efficient multireceiver identity-based encryption and its application to broadcast encryption[C] ∥PKC 2005,Lecture Notes in Computer Science 3386.2005:380-397.
  • 2Frodigh M,et al.Wireless ad hoc networking:The art of net-working without a network[J].Ericsson Review,2000,4:248-263.
  • 3Barbosa M,Farshim P.Efficient identity-based key encapsulation to multiple parties[C] ∥Crytography and Coding,LECTURE NOTES IN COMPUTER SCIENCE 3796.2005:428-441.
  • 4Anton E R,Duarte O C M B.Group key establishment in wireless ad hoc networks[C] ∥Proc.Workshop en Qualidade de Servicoe Mobilidade.2002:1-8.
  • 5Delerablée C.Identity-Based Broadcast Encryption with Con-stant Size Ciphertexts and Private Keys[C] ∥Advances in Cryptology-ASIA CRYPT.Lecture Notes in Computer Science 4833.2007:200-215.
  • 6Asokan N,Ginzboorg P.Key-agreement in ad hoc networks[J].Compute Communication,2000,23(17):1627-1637.
  • 7Ching Y N,Mu Y,Susilo W.An identity-based broadcast encryption scheme for mobile ad hoc networks[J].Communications and Information Technology,2006,1(01):24-29.
  • 8Boneh D,Franklin M.Identity Based Encryption from the Weil Pairing[C] ∥CRYPTO,LNCS 2139.2001:213-229.
  • 9Zhang L Y,Hu Y P,Mu N B.Identity-based Broadcast Encryption Protocol for Ad Hoc Networks[J].IEEE Computer Society,2009:1619-1623.
  • 10Boneh D,Franklin M.Identity-based encryption form the weil pairing[C] ∥Advances in Cryptology-CRYPTO 2001,LNCS 2139.Berlin:Springer-Verlag,2001:213-229.

同被引文献37

  • 1王标,方颖珏,林宏刚,李轶.基于环Z_n上圆锥曲线的QV签名方案[J].中国科学(F辑:信息科学),2009,39(2):212-217. 被引量:3
  • 2孙琦,朱文余,王标.环Z_n上圆锥曲线和公钥密码协议[J].四川大学学报(自然科学版),2005,42(3):471-478. 被引量:44
  • 3李航宇.有限域上的圆锥曲线的数乘运算(英文)[J].信息安全与通信保密,2007,29(8):64-65. 被引量:5
  • 4Shamir A. Identity-based cryptosystem and signature schemes [ C ]//Proceedings of CRYFrO' 84 on Advances in Cryptology. Springer,1985 ,LNCS 196:47 -53.
  • 5Boneh D, Franklin M. Identity based encryption from the Weil pairing [ J ]. SIAM Journal on Computing, 2003,32 (3) :586-615.
  • 6Bellare M, Waters B, Scott Y. Identity-based encryption secure against selective opening attack [ C]//th'oceedings of TCC 2011. 2011:235 -252.
  • 7Icart T. How to hash into elliptic curves [ C ]//Advances in Cryptology--CRYPTO 2009. Berlin, Germany: Springer, 2009, LNCS 5677:303-316.
  • 8Zheng Y L. Digital signcryption or how to achieve cost ( signature & encryption) 《:cost (signature) + cost ( encryption) [ C]//Proceedings of CRYPTO 1997. 1997, LNCS 1294:165-1.79.
  • 9Malone-Lee J. Identity-based signcryption [ EB/OL ]. http :// eprint, iacr. org/2002/098.
  • 10Barreto P S L M,Libert B,McCullagh N,et al. Efficient and provably secure identity-based signatures and signcryption from bilinear maps [ C ]//Proceedings of ASIACRYPT. Chennai, India,2005, LNCS 3788:515-532.

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部