有效的格上无证书加密方案
作者:
作者单位:

作者简介:

通讯作者:

中图分类号:

基金项目:

国家自然科学基金(61472309,61672412,61373171);安徽省高校自然科学基金(KJ2016A626,KJ2016A627)


Efficient Certificateless Encryption Schemes from Lattices
Author:
Affiliation:

Fund Project:

National Natural Science Foundation of China (61472309, 61672412, 61373171); Natural Science Foundation of Anhui Higher Education Institutions (KJ2016A626, KJ2016A627)

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    利用原像抽样算法抽取部分私钥和带误差的学习问题生成秘密值及公钥来构造格上无证书加密方案.在随机预言模型下,借助可抵抗拥有询问秘密值能力的两类攻击者形式化地证明了该方案在自适应选择身份攻击下(甚至是量子的)密文是不可区分的.通过分析方案的正确性、安全性和效率来说明如何选择参数.使用两种不同的扩大明文空间的方法来进一步提高方案的效率.这体现出该方案具有很强的灵活性.特别地,给出了逐步定比特填充法.它是一种由固定长度比特串去确定多个更长比特串的有效方法.该方法在构建多比特无证书加密过程中起到重要作用.鉴于内蕴了格和无证书密码系统的优势,该方案具有灵活、有效、抗量子攻击和不涉及证书管理等优点.

    Abstract:

    A certificateless encryption scheme from lattices is put forward by using preimage sampleable algorithm to extract partial private keys and learning with errors to generate secret values and public keys. The new scheme is indistinguishably secure against adaptive chosen-identity attacks, even against quantum-computing attacks. This is achieved in the random oracle model by formally demonstrating that this construction can fight against two types of adversaries who can request secret values. Proper parameter setting for the scheme is obtained specifically by performing an analysis of its correctness, security, and efficiency. Two methods for further improving its efficiency are used by enlarging its plaintext space according to both distinct approaches, which also shows that the given scheme is flexible. Specially, an efficient method of successive padding with fixed bit is presented for obtaining multiple longer bit strings determined by a fixed-size bit string, which provides a valuable contribution towards building the multi-bit certificateless encryption scheme. Due to advantages inheriting from lattices and certificateless cryptosystem, the proposed schemes are flexible, efficient, resistant to quantum-computing attacks and free from certificate management.

    参考文献
    相似文献
    引证文献
引用本文

陈虎,胡予濮,连至助,贾惠文.有效的格上无证书加密方案.软件学报,2016,27(11):2884-2897

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2015-03-15
  • 最后修改日期:2015-06-16
  • 录用日期:
  • 在线发布日期: 2015-12-25
  • 出版日期:
文章二维码
您是第位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号