期刊文献+

基于多方共管的IBC改进密钥管理方案 被引量:4

IBC IMPROVED KEY MANAGEMENT SCHEME BASED ON MULTI-PARTY CO-MANAGEMENT
在线阅读 下载PDF
导出
摘要 对现有的基于身份密码体制中的多方共管方案进行研究,解决其存在的多个PKG对于用户意见不一致、PKG冒充用户身份生成用户私钥以及用户是否合法生成密钥等问题,提出基于多方共管的改进密钥生成方案。设置一个权威的可信MPKG和n个CPKG,MPKG负责进行用户身份认证以及确保用户合法地利用CPKG生成部分密钥,n个PKG只有在验证用户已经得到权威PKG的认可密钥后才会响应用户的请求为其生成部分密钥。 This paper studies the multi-party co management scheme in the existing identity based cryptosystem,solves the problems existing in the multi PKG,such as the inconsistency of users’opinions,the generation of users’private keys by PKG pretending to be users’identities,and whether users can legally generate keys,and proposes an improved key generation scheme based on multi-party co-management.It set an authoritative and trusted MPKG and n CPKG.MPKG was responsible for user identity authentication and ensuring that users could legally use CPKG to generate part of the key.n PKG would generate part of the key for users only after verifying that users were recognized by the authoritative PKG.
作者 许盛伟 郭春锐 李新玉 Xu Shengwei;Guo Chunrui;Li Xinyu(Beijing Electronic Science and Technology Institute,Beijing 100070,China;School of Telecommunications Engineering,Xidian University,Xi’an 710071,Shaanxi,China)
出处 《计算机应用与软件》 北大核心 2020年第8期314-317,共4页 Computer Applications and Software
基金 国家重点研发计划项目(2018YFB0803600)。
关键词 基于身份的加密体制 密钥管理 多方共管 双线性对 Identity-based encryption system Key management Multi-party co-management Bilinear pairing
  • 相关文献

参考文献7

二级参考文献29

  • 1FU Cai HONG Fan LI Rui-xian HONG Liang CHEN Jing.Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model[J].Wuhan University Journal of Natural Sciences,2006,11(1):188-192. 被引量:5
  • 2李俊,崔国华,郑明辉.移动自组网络安全分布式组密钥管理方案[J].小型微型计算机系统,2007,28(6):991-997. 被引量:6
  • 3Sattam S.Al-Riyami,Kenneth G.Paterson.Certificateless Public Key Cryptography[C].Proc of Advances in Cryptology,Califomia,USA:Springer-Verlag,2003:452-473.
  • 4BONEH D,FRANKLIN M.Identity-based Encryption from the Weil paring[C].Proc of Advances in Cryptology.New York,USA:Springer-Verlag,2001:213-229.
  • 5Cocks C.An Identity Based Encryption Scheme Based on Quadratic Residues[C].Proc of International Conference on Cryptography and Coding-Proceedings of IMA,Cirencester,UK:Springer-Verlag,2001:360-363.
  • 6Horwitz J,Lynn B.Toward Hierarchical Identity-Based Encryption[C].Proc of Advances in Cryptology,California,USA:Springer-Verlag,2002:466-481.
  • 7Sakai R.Kasahara M.ID Based Cryptosystems with Pairing on Elliptic Curve[R].Cryptology ePrint Archive,Report 2003/054.
  • 8Sahai A,Waters B.Fuzzy Identity-Based Encryption[C].Proc of Advances in Cryptology,California,USA:Springer-Verlag,2005:457-473.
  • 9Boneh D,Boyen X.Efficient Selective-ID Secure IdentityBased Encryption without Random Oracles[C].Proc of Advances in Cryptology,California,USA:Springer-Verlag,2004:223-238.
  • 10Waters BR.Efficient Identity-Based Encryption without Random Oracles[C].Proc of Advances in Cryptology,California,USA:Springer-Verlag,2005:114-127.

共引文献17

同被引文献21

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部