期刊文献+
共找到96篇文章
< 1 2 5 >
每页显示 20 50 100
Some Remarks on Cocks'Identity-Based Encryption Scheme
1
作者 ZHAO Xiaopeng 《Journal of Donghua University(English Edition)》 CAS 2024年第4期447-450,共4页
The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However... The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme. 展开更多
关键词 identity-based encryption(ibe) quadratic residue SECURITY Cocks’ibe scheme
在线阅读 下载PDF
Identity-based Encryption with Non-Interactive Opening 被引量:2
2
作者 范佳 唐小虎 +1 位作者 康立 路献辉 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期670-674,共5页
An identity-based encryption(IBE) was studied with non-interactively opening property that the plain text of a ciphertext can be revealed without affecting the security of the encryption system.Two kinds of non-intera... An identity-based encryption(IBE) was studied with non-interactively opening property that the plain text of a ciphertext can be revealed without affecting the security of the encryption system.Two kinds of non-interactive opening properties for IBE schemes were defined along with a concrete scheme in each case. 展开更多
关键词 identity-base encryption ibe public-key encryption with non-interactive opening (PKENO) identity-based encryption with non-interactive opening ibeNO)
原文传递
Identity-based Broadcast Encryption with Shorter Transmissions 被引量:2
3
作者 张乐友 胡予濮 牟宁波 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期641-645,共5页
This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphe... This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphertexts. Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network. Finally, the proposed schemes are provable security under the decision generalized bilinear Diffi-Hellman (GBDH) assumption in the random oracles model. 展开更多
关键词 broadcast encryption identity-based encryption short transmissions provable security
原文传递
Fully Secure Identity-based Broadcast Encryption in the Subgroups 被引量:1
4
作者 张乐友 胡予濮 吴青 《China Communications》 SCIE CSCD 2011年第2期152-158,共7页
In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive se... In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive security) under three static(i.e. non q-based) assumptions. It is worth noting that only recently Waters gives a short ciphertext broadcast encryption system that is even adaptively secure under the simple assumptions. One feature of our methodology is that it is relatively simple to leverage our techniques to get adaptive security. 展开更多
关键词 identity-based broadcast encryption dual system encryption full security static assumption SUBGROUP provable security
在线阅读 下载PDF
OBLIVIOUS TRANSFER WITH ACCESS CONTROL AND IDENTITY-BASED ENCRYPTION WITH ANONYMOUS KEY ISSUING
5
作者 Xu Lingling Zhang Fangguo Wen Yamin 《Journal of Electronics(China)》 2011年第4期571-579,共9页
In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the ... In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption(IBE) with Anonymous Key Issuing(AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow. 展开更多
关键词 Oblivious Transfer(OT) Access Control(AC) identity-based encryption(ibe) Anonymous Key Issuing(AKI)
在线阅读 下载PDF
Secure Proxy Re-Encryption from CBE to IBE
6
作者 CHEN Yan ZHANG Futai 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期657-661,共5页
In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a traditional public key cryptosystem into the ciphertexts in an identity-based system is proposed. Th... In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a traditional public key cryptosystem into the ciphertexts in an identity-based system is proposed. The scheme is non-interactive, unidirectional and collude "safe". Furthermore, it is compatible with current IBE (identity-based encryption) deployments. The scheme has chosen ciphertext security in the random oracle model assuming the hardness of the Decisional Bilinear Diffie-Hellman problem. 展开更多
关键词 proxy re-encryption traditional public key encryption identity-based public key encryption Decisional Bilinear Diffie-Hellman problem random oracle model
原文传递
An Identity-Based Encryption Scheme with Compact Ciphertexts
7
作者 刘胜利 郭宝安 张庆胜 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期86-89,共4页
This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key s... This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key system is that it can avoid public key certificates and certificate management. Our identity-based encryption scheme enjoys short ciphertexts and provable security against chosen-ciphertext attack (CCA). 展开更多
关键词 identity-based encryption compact ciphertext ehosen-ciphertext attack (CCA)
原文传递
An Efficient Identity-Based Homomorphic Broadcast Encryption
8
作者 Mei Cai 《Journal of Computer and Communications》 2019年第2期23-30,共8页
Broadcast encryption (BE) allows a sender to broadcast its message to a set of receivers in a single ciphertext. However, in broadcast encryption scheme, ciphertext length is always related to the size of the receiver... Broadcast encryption (BE) allows a sender to broadcast its message to a set of receivers in a single ciphertext. However, in broadcast encryption scheme, ciphertext length is always related to the size of the receiver set. Thus, how to improve the communication of broadcast encryption is a big issue. In this paper, we proposed an identity-based homomorphic broadcast encryption scheme which supports an external entity to directly calculate ciphertexts and get a new ciphertext which is the corresponding result of the operation on plaintexts without decrypting them. The correctness and security proofs of our scheme were formally proved. Finally, we implemented our scheme in a simulation environment and the experiment results showed that our scheme is efficient for practical applications. 展开更多
关键词 identity-based BROADCAST encryption Homomorphic COMMUNICATION
在线阅读 下载PDF
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture
9
作者 Carlisle Adams 《Journal of Information Security》 2022年第4期323-336,共14页
Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the... Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the environment. Several constructions have been proposed to reduce the trust required in the PKG (and thus preserve the privacy of users), but these have generally relied on unrealistic assumptions regarding non-collusion between various entities in the system. Unfortunately, these constructions have not significantly improved IBE adoption rates in real-world environments. In this paper, we present a construction that reduces trust in the PKG without unrealistic non-collusion assumptions. We achieve this by incorporating a novel combination of digital credential technology and bilinear maps, and making use of multiple randomly-chosen entities to complete certain tasks. The main result and primary contribution of this paper are a thorough security analysis of this proposed construction, examining the various entity types, attacker models, and collusion opportunities in this environment. We show that this construction can prevent, or at least mitigate, all considered attacks. We conclude that our construction appears to be effective in preserving user privacy and we hope that this construction and its security analysis will encourage greater use of IBE in real-world environments. 展开更多
关键词 Security Analysis identity-based encryption (ibe) Reducing Trust Preserving Privacy Honest-but-Curious Attacker Malicious Attacker
在线阅读 下载PDF
Construction and Implementation of a Privacy-Preserving Identity-Based Encryption Architecture
10
作者 David Bissessar Carlisle Adams 《Journal of Information Security》 2023年第4期304-329,共26页
A recent proposal by Adams integrates the digital credentials (DC) technology of Brands with the identity-based encryption (IBE) technology of Boneh and Franklin to create an IBE scheme that demonstrably enhances priv... A recent proposal by Adams integrates the digital credentials (DC) technology of Brands with the identity-based encryption (IBE) technology of Boneh and Franklin to create an IBE scheme that demonstrably enhances privacy for users. We refer to this scheme as a privacy-preserving identity-based encryption (PP-IBE) construction. In this paper, we discuss the concrete implementation considerations for PP-IBE and provide a detailed instantiation (based on q-torsion groups in supersingular elliptic curves) that may be useful both for proof-of-concept purposes and for pedagogical purposes. 展开更多
关键词 identity-based encryption (ibe) Digital Credentials (DC) PRIVACY Pairing-Based Cryptography Supersingular Elliptic Curve q-Torsion Group
在线阅读 下载PDF
A Hierarchical Attribute-Based Encryption Scheme 被引量:2
11
作者 ZOU Xiubin 《Wuhan University Journal of Natural Sciences》 CAS 2013年第3期259-264,共6页
According to the relation of an attribute set and its subset,the author presents a hierarchical attribute-based encryption scheme in which a secret key is associated with an attribute set.A user can delegate the priva... According to the relation of an attribute set and its subset,the author presents a hierarchical attribute-based encryption scheme in which a secret key is associated with an attribute set.A user can delegate the private key corresponding to any subset of an attribute set while he has the private key corresponding to the attribute set.Moreover,the size of the ciphertext is constant,but the size of private key is linear with the order of the attribute set in the hierarchical attribute-based encryption scheme.Lastly,we can also prove that this encryption scheme meets the security of IND-sSETCPA in the standard model. 展开更多
关键词 attribute-based encryption hierarchical attributebased encryption identity-based encryptionibe bilinear map
原文传递
Identity-Based Encryption with Equality Test Supporting Accountable Authorization in Cloud Computing
12
作者 Zhen Zhao Bao-Cang Wang Wen Gao 《Journal of Computer Science & Technology》 2025年第1期215-228,共14页
Identity-based encryption with equality test(IBEET)is proposed to check whether the underlying messages of ciphertexts,even those encrypted with different public keys,are the same or not without decryption.Since peopl... Identity-based encryption with equality test(IBEET)is proposed to check whether the underlying messages of ciphertexts,even those encrypted with different public keys,are the same or not without decryption.Since people prefer to encrypt before outsourcing their data for privacy protection nowadays,the research of IBEET on cloud computing applications naturally attracts attention.However,we claim that the existing IBEET schemes suffer from the illegal trapdoor sharing problem caused by the inherited key escrow problem of the Identity-Based Encryption(IBE)mechanism.In traditional IBEET,the private key generator(PKG)with the master secret key generates trapdoors for all authorized cloud servers.Considering the reality in practice,the PKG is usually not fully trusted.In this case,the Private-Key Generator(PKG)may generate,share,or even sell any trapdoor without any risk of being caught,or not being held accountable,which may lead to serious consequences such as the illegal sharing of a gene bank's trapdoors.In this paper,to relieve the illegal trapdoor sharing problem in IBEET,we present a new notion,called IBEET Supporting Accountable Authorization(IBEET-AA).In IBEET-AA,if there is a disputed trapdoor,the generator will be distinguished among the PKG and suspected testers by an additional tracing algorithm.For the additional tracing function,except for the traditional indistinguishability(IND)and one-way(OW)security models in IBEET,we define three more security models to protect the tracing security against dishonest authorizers,PKG,and testers,respectively.Based on Gentry's IBE scheme,we instantiate IBEET-AA and give a specific construction along with a formalized security proof with random oracles. 展开更多
关键词 identity-based encryption with equality test accountable authorization cloud computing Gentry's ibe zero-knowledge proof
原文传递
SA-IBE:一种安全可追责的基于身份加密方案 被引量:7
13
作者 曹丹 王小峰 +2 位作者 王飞 胡乔林 苏金树 《电子与信息学报》 EI CSCD 北大核心 2011年第12期2922-2928,共7页
基于身份加密(Identity-Based Encryption,IBE)方案中,用户公钥直接由用户身份得到,可以避免公钥基础设施(Public Key Infrastructure,PKI)系统的证书管理负担。但IBE存在密钥托管问题,即私钥生成器(PrivateKey Generator,PKG)能够解密... 基于身份加密(Identity-Based Encryption,IBE)方案中,用户公钥直接由用户身份得到,可以避免公钥基础设施(Public Key Infrastructure,PKI)系统的证书管理负担。但IBE存在密钥托管问题,即私钥生成器(PrivateKey Generator,PKG)能够解密用户密文或泄漏用户私钥,而现有解决方案一般需要安全信道传输私钥,且存在用户身份认证开销大或不能彻底解决密钥托管问题的缺陷。该文提出一种安全可追责的基于身份加密方案,即SA-IBE方案,用户原私钥由PKG颁发,然后由多个密钥隐私机构并行地加固私钥隐私,使得各机构无法获取用户私钥,也不能单独解密用户密文;设计了高效可追责的单点PKG认证方案;并采用遮蔽技术取消了传输私钥的安全信道。文中基于标准的Diffie-Hellman假设证明了SA-IBE方案的安全性、解决密钥托管问题的有效性以及身份认证的可追责性。 展开更多
关键词 基于身份加密(ibe) 密钥托管 安全信道 可追责 遮蔽技术
在线阅读 下载PDF
基于IBE和数字水印的电子印章解决方案 被引量:6
14
作者 林宇 于孟涛 +1 位作者 王金玲 胡亮 《吉林大学学报(信息科学版)》 CAS 2007年第4期406-411,共6页
为了满足电子交易中电子文档的可用性、安全性、权威性,提出了一种基于IBE(Identity Based Encryp-tion)技术和数字水印技术的电子印章解决方案。该方案使用IBE技术分配成对的密钥完成水印的嵌入和提取验证。在保证与基于PKI(Public Key... 为了满足电子交易中电子文档的可用性、安全性、权威性,提出了一种基于IBE(Identity Based Encryp-tion)技术和数字水印技术的电子印章解决方案。该方案使用IBE技术分配成对的密钥完成水印的嵌入和提取验证。在保证与基于PKI(Public Key Infrastructure)技术的印章系统具有等同安全强度的同时,具有降低成本、提高效率的优点。 展开更多
关键词 基于身份的加密 数字水印 电子印章
在线阅读 下载PDF
基于身份别名的加入辅助认证方的IBE方案 被引量:4
15
作者 胡德斌 王金玲 +2 位作者 于孟涛 林宇 胡亮 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2008年第2期419-422,共4页
用户如何向PKG证明自己的身份以及PKG如何安全地将用户的私钥送到用户的手中是IBE系统面临的两大技术问题。本文通过加入辅助认证方(TA)的方式实现信任转移,解决密钥托管的问题。用户的私钥由用户和PKG共同产生,通过引入身份别名,方便... 用户如何向PKG证明自己的身份以及PKG如何安全地将用户的私钥送到用户的手中是IBE系统面临的两大技术问题。本文通过加入辅助认证方(TA)的方式实现信任转移,解决密钥托管的问题。用户的私钥由用户和PKG共同产生,通过引入身份别名,方便了私钥更新。分析表明,该方案在保证安全性的同时,解决了部署IBE系统所遇到的问题,明显扩大了IBE系统的可应用范围。 展开更多
关键词 计算机系统结构 ibe 别名 私钥产生器 加密
在线阅读 下载PDF
一种基于种子密钥SPK的IBE加密体制设计方案 被引量:12
16
作者 钟旭 陆浪如 +1 位作者 南相浩 洪泽勤 《微计算机信息》 北大核心 2005年第4期226-227,共2页
该文根据IBE加密体制的思想,应用基于椭圆曲线SPK的密钥管理体制,设计了一种基于椭圆曲线SPK的IBE加密体制。该体制免除了复杂的CA证书认证过程,满足加密卡节省存储空间和生成密钥对方便的要求,为加密卡的优化提供了一种新思路。
关键词 SPK ibe加密体制 KPKMS 椭圆曲线
在线阅读 下载PDF
基于信任服务的IBE系统 被引量:2
17
作者 胡亮 初剑峰 +2 位作者 林宇 王首道 金哲 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2009年第3期737-742,共6页
针对现有的基于身份的加密(Identity Based Encryption,IBE)系统缺少标识管理、权限管理、密钥管理,没有解决域间互操作的问题。通过在现有的IBE系统上增加4个管理机制完善系统。设计了基于信任服务的IBE系统。介绍了该方案的系统架构... 针对现有的基于身份的加密(Identity Based Encryption,IBE)系统缺少标识管理、权限管理、密钥管理,没有解决域间互操作的问题。通过在现有的IBE系统上增加4个管理机制完善系统。设计了基于信任服务的IBE系统。介绍了该方案的系统架构和工作原理,并将该方案与PKI系统进行对比,对比结果证明了其高安全性、高效率、低成本的优势。 展开更多
关键词 计算机系统结构 数据安全 基于身份的加密 信任服务 密钥管理
在线阅读 下载PDF
HIBE-MPJ:一种基于HIBE的物联网环境下跨域通信机制研究 被引量:5
18
作者 季一木 陆毅成 +6 位作者 刘尚东 王舒 唐玟 肖小英 何亦拓 王凯瑞 吴海丰 《南京邮电大学学报(自然科学版)》 北大核心 2020年第4期1-10,共10页
基于身份的加密方案解决了传统公钥加密体制在证书管理方面的不足,使基于身份的加密方案能适应物联网轻量级的环境。针对基于身份加密在物联网环境中的应用存在密钥托管和跨域认证等问题,提出一种分层的基于身份加密(Hierarchical Ident... 基于身份的加密方案解决了传统公钥加密体制在证书管理方面的不足,使基于身份的加密方案能适应物联网轻量级的环境。针对基于身份加密在物联网环境中的应用存在密钥托管和跨域认证等问题,提出一种分层的基于身份加密(Hierarchical Identity-Based Encryption,HIBE)的物联网环境下多私钥生成机构(Private Key Generator,PKG)联合跨域认证及通信机制HIBE-MPJ(Hierarchical Identity-Based Encryption-Multiple Private Key Generator Joint)。HIBE-MPJ使用不同信任域的PKG作为跨域认证时的信任网关,通过密钥共享解决不同信任域PKG的密钥托管问题,并建立安全的通信密钥协商机制,使得不同系统参数的两个物联网信任域内的用户节点能互相认证,并提高通信时的效率。随后对认证过程给出了正确性分析,并分析了该方案在随机预言模型下的安全性,并加以实验测试分析,实验结果表明,HIBE-MPJ具有安全性及可行性。最后通过理论证明和构建物联网环境进行实验测试,实验结果表明HIBE-MPJ模型的安全性和可行性。 展开更多
关键词 物联网 公钥加密 基于身份加密 跨域认证
在线阅读 下载PDF
基于IBE的XML加密数据安全交换研究 被引量:2
19
作者 叶晓彤 邓云 简清明 《计算机应用与软件》 CSCD 2010年第3期110-113,共4页
当前XML加密普遍采用对称算法和非对称算法组合的"二次"加密方式,并且密钥交换依赖传统PKI体制,存在加/解密过程复杂等缺陷。通过对XML加密规范和IBE体制以及双线性映射算法的研究,提出采用IBE密钥机制和双线性映射算法实现XM... 当前XML加密普遍采用对称算法和非对称算法组合的"二次"加密方式,并且密钥交换依赖传统PKI体制,存在加/解密过程复杂等缺陷。通过对XML加密规范和IBE体制以及双线性映射算法的研究,提出采用IBE密钥机制和双线性映射算法实现XML加密的数据安全交换方案,对相应的XML数据交换过程和XML加密文件结构进行了设计,对该方式的XML加密关键环节实现方式做了具体阐述。作为一种新型XML加密方案,在保证数据安全交换的同时,简化了XML加密过程,并克服了传统PKI的缺陷。 展开更多
关键词 XML加密 ibe体制 双线性映射算法 密钥
在线阅读 下载PDF
基于IBE技术的学分制管理系统安全解决方案 被引量:1
20
作者 孙飞显 程世辉 +2 位作者 刘孙俊 王电钢 王铁方 《计算机应用研究》 CSCD 北大核心 2006年第12期121-123,126,共4页
针对目前学分制管理系统存在的数据存储不加密、数据传输不安全、身份验证不严格等问题,分析了用PKI技术解决这些问题的不足,提出了一种基于身份加密技术的改进方案。采用表示用户身份的任意字符串作为公钥、严格验证用户身份、对关键... 针对目前学分制管理系统存在的数据存储不加密、数据传输不安全、身份验证不严格等问题,分析了用PKI技术解决这些问题的不足,提出了一种基于身份加密技术的改进方案。采用表示用户身份的任意字符串作为公钥、严格验证用户身份、对关键数据进行数字签名、网络传输使用安全连接等方法,保证了数据存储、传输等过程的机密性、完整性、可用性和不可抵赖性,克服了传统PKI技术产生、存储和管理公钥麻烦、系统实现复杂、成本高、效率低等缺点。理论分析和实验结果表明该方法是学分制管理系统安全问题的较好解决方案。 展开更多
关键词 网络安全 基于身份加密 PKI 管理系统
在线阅读 下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部