期刊文献+

两个公钥加密方案的安全性分析 被引量:1

Security analysis of two public key encryption schemes
在线阅读 下载PDF
导出
摘要 广播加密和基于属性加密是两种重要的公钥加密方案,可将加密内容同时传送给多个用户,在付费电视、数字版权管理和资源访问控制等领域有重要应用。对一个基于身份广播加密方案进行了分析,表明攻击者只要得到某个用户的私钥,就可以计算其他任何用户的私钥。研究了一个基于属性加密方案,该方案并不能真正地隐藏访问结构,攻击者仅由密文就能得到对应的访问结构。 Broadcast encryption (BE) and attribute-based encryption (ABE) schemes are two kinds of important public key encryption schemes, which can transmit an encrypted message to a lot of users simultaneously, and has significant application in many fields such as Pay-TV, digital copyright management and resource access control and so on. This paper first analyzed an identity-based BE (IBBE) scheme and the result shows that the attacker can compute the private key of any other user if it can obtain the key of one user. It also studied an ABE scheme, and proved that the scheme cannot really hide the access struc- ture and the attacker can get the associated access structure only from a ciphertext.
作者 解理 任艳丽
出处 《计算机应用研究》 CSCD 北大核心 2015年第1期218-221,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61202367) 上海市自然科学基金资助项目(12ZR1443700) 上海市教委创新基金资助项目(14YZ020)
关键词 基于身份 广播加密 基于属性加密 密码分析 identity-based broadcast encryption attributed-based encryption cryptanalysis
  • 相关文献

参考文献3

二级参考文献33

  • 1Fiat A and Naor M.Broadcast encryption[C].CRYPTO'93,1993,LNCS 773:480-491.
  • 2Zhang Y L,Zhang Y K,and Zhang J.An ID-based broadcast encryption scheme for collaborative design[C].International Conference on Networks Security,Wireless Communications and Trusted Computing,IEEE Computer Society,2009,NSWCTC,Vol.346:699-702.
  • 3Delerabl(e)e C,Paillier P,and Pointcheval D.Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys[C].2007,LNCS 4575:39-59.
  • 4Sharmila D S S,Sree V S,and Ragavendran G,et al..Cryptanalysis of ID-based signcryption scheme for multiple receivers[R].Cryptology ePrint Archive,Report 2008/238,2008.
  • 5Zhang L Y,Hu Y P,and Mu N B.Identity-based broadcast encryption protocol for Ad hoc networks[C].The 9th International Conference for Young Computer Scientists,IEEE Computer Society,2009,ICYCS,Vo1.194:1619-1623.
  • 6Shamir A.Identity-based cryptosyetems and signature schemes[C].CRYPTO 1984,1984,LNCS 196:47-53.
  • 7Waters B.Efficient identity based encryption without random oracles[C].EUROCRYPT 2005,LNCS 3494:114-127.
  • 8Baek J,Safavi-Naini Rt,and Susilo W.Efficient multi-receiver identity-based encryption and its application to broadcast encryption[C].PKC 2005,LNCS 3386:380-397.
  • 9Barbosa M and Farshim P.Efficient identity-based ksy encapsulation to multiple parties[C].Cryptography and Coding,10th IMA International Conference Cirencester,2005,LNCS 3796:428-441.
  • 10Waters B.Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions[C].Advances in Cryptology-CRYPTO 2009,LNCS 5677:619-636.

共引文献28

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部