期刊文献+

基于身份密码学的安全性研究综述 被引量:18

Survey of Security on Identity-Based Cryptography
下载PDF
导出
摘要 目前IBE已经成为公钥加密领域的一个研究热点,而安全性是构建IBE方案的重要因素.在设计公钥加密方案时,通常主要考虑在各种攻击模型下所要达到的安全目标,使用安全目标与攻击模型相结合的方式来定义安全性.在对已提出的IBE方案进行归纳分析的基础上,概括了IBE安全性的形式化定义;总结了安全性所依赖的各种数学难题基础,对各种数学难题之间的强弱关系进行了分析;进而,基于这些强弱关系描述了IBE安全性之间的相互转化规律以及达到高安全性的转化方法,这些方法有一个共同点,就是在加密方案的构造过程中使用了某种测试;接下来,从安全性和效率的角度对比了已提出的典型IBE方案,指出低安全性向高安全性转化必然会带来额外开销,导致效率下降;最后,总结了IBE的缺点、未来研究趋势以及开放性问题. Nowadays, identity-based encryption (IBE) has become a new research direction of public key encryption, and security is the most important factor for constructing an IBE scheme. When designing a public encryption scheme, security goals are usually considered by the standard of attack models. And then, the definition of security combines both security goal and attack models. After analyzing the proposed IBE schemes, the authors present the formalized definition of IBE security and provide the comparison with security of traditional public key encryption. They also summarize the various mathematical assumptions on which the security relies and study the relations among assumptions. Furthermore, transformation rules among securities and transformation methods to reach higher security are described, and it is pointed out that these transformation methods all use some test in the construction, i. e. , they give some additional disposal of ciphertext or factor construction in the encryption phase; meanwhile, they can verify the validity of ciphertext in the decryption phase. Later, also contrasted are the IBE schemes on the security and efficiency, which indicates that the transformation to reach higher security will reduce efficiency. Finally, the disadvantages of IBE, future research directions and open problems are summarized.
出处 《计算机研究与发展》 EI CSCD 北大核心 2009年第9期1537-1548,共12页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60473099 60873235) 教育部新世纪优秀人才支持计划基金项目(NCET-06-0300)~~
关键词 公钥加密 基于身份密码学 基于身份加密的安全性 选择性密文安全 双线性映射 public key encryption identity-based cryptography security of identity-based encryption chosen-ciphertext security bilinear map
  • 相关文献

参考文献74

  • 1Diffie W, Hellman M E. New directrions in cryptography [J]. IEEE Trans on Information Theory, 1976, 22(6) : 644- 654.
  • 2Rivest R L, Shamir A, Adelman L. A method for obtaining digital signatures and public key cryptosystem [J]. Communications of ACM, 1987, 21(2):120-126.
  • 3ElCamal T. A public key cryptosystem and a signature scheme based on discrete logarithms [J]. IEEE Trans on Information Theory. 1985, 31(4): 469-472.
  • 4Miller V. Use of elliptic curves in cryptography [G] //LNCS 216: Proc of the Advances in Cryptology--Crypto'85. Berlin: Springer, 1985:417-426.
  • 5Koblitz N. Elliptic curve cryptosystems [J]. Mathematics of Computation. 1987, 48(177): 203-209.
  • 6Goldwasser S, Mieali S. Probabilistie encryption[J]. Journal of Computer and System Sciences, 1984, 28 (2) : 270-299.
  • 7Micali S, Rackoff C, Sloan R. The notion of security for probabitistic cryptosystems [J]. SlAM Journal on Computing, 1988, 17(2) : 412-426.
  • 8Dolev D, Dwork C, Naor M. Non-malleable cryptography [J]//Proc of the 23rd Annual Syrup on Theory of Computing (STOC'91). New York: ACM, 1991:542-552.
  • 9Dolev D, Dwork C, Naor M. Non-malleable cryptography: CS95 27 [R/OL]. [ 2008-07-10 ]. http://www, stat. washington, edu/tech, reports/.
  • 10Dolev D, Dwork C, Naor M. Non-malleable cryptography [J]. SIAM Journal on Computing, 2000, 30(2): 391-437.

二级参考文献58

  • 1Crammer R, Shoup V. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-key Eneryption[DB/OL].http ://iacr. org/2001/085. ps.2001.
  • 2Elkind E, Schai A. A Unified Methodology for Constructing Public-key Encryption Schemes Secure Against Adaptive Chosen-ciphertext Attack[ DB/OL ]. http://iacr. org/2002/042. ps. gz. 2002-10-16.
  • 3Goldwasser S, Micali S. Probabilistic Encryption[J]. Computer and System Sciences, 1984, 28(2) : 270-299.
  • 4Bellare M, Rogaway P. Random Oracles are Practical: a Paradigm for Designing Efficient Protocols [ A ]. Proceedings of the First Annual Conference on Computer and Communications Secruity[ C ]. New York: ACM, 1993. 62-73.
  • 5Bellare M, Desai A, Pointcheval D, et al. Relations Among Notions of Security for Public-key Encryption Schemes[A]. Crypt'98:LNCS 1462[C]. Berlin: Springer-Verlag, 1998. 26-45.
  • 6Micali S, Rackoff C, Sloan R. The Notion of Security for Probabilistic Cryptosystems[J]. SIAM J on Computing, 1988, 17(2) : 412-426.
  • 7Dolev D, Dwork C, Naor M. Non-malleable Cryptography[J]. SIAM J on Computing, 2000, 30(2): 391--437.
  • 8Bellare M, Sahai A. Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization[A]. Crypto'99: LNCS 1666[C]. Berlin: Springer-Verlag, 1999. 519-536.
  • 9Watanahe Y, Shikata J,Imai H. Equivalence between Semantic Security and Indistinguishability Against Chosen Ciphertext Attacks[A]. PKC'2003: LNCS 2567[C]. Berlin: Springer-Veralg, 2003. 71-84.
  • 10Shoup V. Why Chosen Ciphertext Security Matters[S]. Research Report 3076( # 93122), 1998.

共引文献25

同被引文献186

引证文献18

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部