基于Weil对的多接收者公钥加密方案
作者:
基金项目:

Supported by the National Natural Science Foundation of China under Grant Nos.60373041, 60573053 (国家自然科学基金)


Multi-Recipient Public Key Encryption Scheme Based on Weil Pairing
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [13]
  • |
  • 相似文献
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    提出了一种多接收者公钥加密方案,称为基于双线性映射的多接收者公钥加密(pairing-based multi-recipient encryption,简称PBMRE).该方案使用椭圆曲线上的Weil对和Shamir的秘密分享方法来构造.利用秘密分享方法处理私钥,可以将一个解密私钥转换成多个用户私钥.利用Weil对的双线性,在解密时可以重新组合解密私钥.经过分析,给出的多接收者公钥加密方案效率高,并且能抵抗多个接收者的合谋攻击.基于间隙双线性Diffie-Hellman假设,证明了该体制具有抗自适应选择密文攻击的不可区分安全性(indistinguishability under adaptive chosen ciphertext attack,简称IND-CCA2).

    Abstract:

    This paper proposes a multiple-recipient public key encryption, called pairing-based multi-recipient encryption (PBMRE). The proposed scheme is constructed on Weil pairing on elliptic curves and the Shamir's secrets sharing scheme. As a result, a private key for decryption can be converted to multiple users' private keys by secrets sharing, and reconstructed by the bilinear property of Weil Pairing in decryptions. Through an analysis, it is shown that this scheme is efficient and can effectively defend against deciphers' collaborating. Based on the Gap-BDH (gap-bilinear Diffie-Hellman) assumption and the random oracle model, a strict security proof is presented stating that the scheme has the indistinguishability under adaptive chosen ciphertext attack,简称 (IND-CCA2).

    参考文献
    [1]Bellare M,Boldyreva A,Micali S.Public-Key encryption in a multi-user setting:Security proofs and improvements.In:Preneel B,ed.Advances in Cryptology-EUROCRYPT 2000.Berlin:Springer-Verlag,2000.259-274.
    [2]Bellare M,Boldyreva A,Staddon J.Multi-Recipient encryption schemes:Security notions and randomness re-use.In:Desmedt Y,ed.Proc.of the Public Key Cryptography-PKC 2003,the 6th Int'l Workshop on Theory and Practice in Public Key Cryptography.Berlin:Springer-Verlag,2003.85-99.
    [3]Kurosawa K.Multi-Recipient public-key encryption with shortened ciphertext.In:Naccache D,ed.Proc.of the Public Key Cryptography-PKC 2002,the 5th Int'l Workshop on Practice and Theory in Public Key Cryptosystems.Berlin:Springer-Verlag,2002.48-63.
    [4]Feng DG.Research on theory and approach of provable security.Journal of Software,2005,16(10):1743-1756 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/16/1743.htm
    [5]Baudron O,Pointcheval D,Stern J.Extended notions of security for multicast public key cryptosystems.In:Montanari U,ed.Proc.of the Automata,Languages and Programming,the 27th Int'l Colloquium.Berlin:Springer-Verlag,2000.499-511.
    [6]ElGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms.IEEE Trans.on Information Theory,1985,IT-31(4):469-472.
    [7]Boneh D,Franklin M.Identity-Based encryption from the weil pairing.In:Kilian J,ed.Advances in Cryptology-CRYPTO 2001,the 21st Annual Int'l Cryptology Conf.Berlin:Springer-Verlag,2001.213-230.
    [8]Chen L,Harrison K,Soldera D,Smart NP.Applications of multiple trust authorities in pairing based cryptosystems.In:Davida GI,ed.Proc.of the Infrastructure Security,Int'l Conf.,InfraSec 2002.Berlin:Springer-Verlag,2002.260-275.
    [9]Smart NP.Access control using pairing based cryptography.In:Joye M,ed.Proc.of the Topics in Cryptology-CT-RSA 2003,the Cryptographers' Track at the RSA Conf.2003.Berlin:Springer-Verlag,2003,111-121.
    [10]Mu Y,Susilo W,Lin YX.Identity-Based broadcasting.In:Johansson T,ed.Proc.of the Progress in Cryptology-INDOCRYPT 2003,4th Int'l Conf.on Cryptology in India.Berlin:Springer-Verlag,2003.177-190.
    [11]Baek J,Safavi-Naini R,Susilo W.Efficient multi-receiver identity-based encryption and its application to broadcast encryption.In:Vaudenay S,ed.Proc.of the Public Key Cryptography-PKC 2005,the 8th Int'l Workshop on Theory and Practice in Public Key Cryptography.Berlin:Springer-Verlag,2005.380-397.
    [12]Shamir A.How to share a secret.ACM Communications,1979,22(11):612-613.
    [13]Okamoto T,Pointcheval D.REACT:Rapid enhanced-security asymmetric cryptosystem transform.In:Naccache D,ed.Proc.of the Topics in Cryptology-CT-RSA 2001,the Cryptographer's Track at RSA Conf.2001.Berlin:Springer-Verlag,2001.159-174.
    相似文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

鲁 力,胡 磊.基于Weil对的多接收者公钥加密方案.软件学报,2008,19(8):2159-2166

复制
分享
文章指标
  • 点击次数:4906
  • 下载次数: 6885
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2006-11-09
  • 最后修改日期:2007-03-19
文章二维码
您是第19924519位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号