期刊文献+

多接收者环境下的匿名性和密文长度缩短的匿名广播加密算法(英文) 被引量:1

Key privacy in multi-recipient setting and shortened private broadcast encryption
在线阅读 下载PDF
导出
摘要 形式化构建了在多用户环境和随机数复用多用户环境下的匿名性安全模型,并证明了其安全性;同时提出了2种针对匿名性的可复制测试.基于这些结果,构造了一个通用的密文长度缩短的匿名广播加密算法. In this paper,we formally built the security models on key privacy in the multi-recipient and randomness re-using multi-recipient setting and proved their security. Two associated reproducibility tests concerning key privacy were proposed. Based on these results,we constructed a general shortened private broadcast encryption scheme which approximately halves ciphertext overhead and computational cost.
出处 《中国科学院研究生院学报》 CAS CSCD 北大核心 2010年第1期90-106,共17页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 supported by the National Grand Fundamental Research 973 Program of China(2007CB807902) the National High-Tech Research and Development Plan of China(2006AA01Z423)
关键词 匿名性 随机数 多接受者 广播加密 匿名广播加密 key privacy randomness multi-recipient broadcast encryption private broadcast encryption
  • 相关文献

参考文献23

  • 1Naor M ,Yung M. Public-key cryptosystems provably secure against chosen ciphertext attacks [ C ]//22nd Annual ACM Symposium on Theory of Computing. 1990:427-437.
  • 2Rackoff C ,Simon D. Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack[ C ]//Advances in Cryptology Crypto 91. 1991:433-444.
  • 3Dolev D, Dwork C, Naor M. Non-malleable cryptography[ C ]//23rd Annual ACM Symposium on Theory of Computing. 1991:542-552.
  • 4Extended version : Dolev D, Dwork C, Naor M. Non-malleable cryptography[ J ]. SIAM J Computing, 2000,30 (2) :391-437.
  • 5Bellare M, Boldyreva A, Desai A ,et al. Key-privacy in public-key encryption[ C ]//Asiacrypt. 2001.
  • 6Baudron O, Pointcheval D,Stern J. Extended notions of security for multicast public key eryptosystems[ C ]//ICALP 2000.
  • 7Bellare M, Boldyreva A, Micali S. Public-key encryption in a multi-user setting: security proofs and improvements[ C ]//Eurocrypt 2000.
  • 8Kurosawa K. Muhi-recipient public-key encryption with shortened ciphertext [ C ] // Proceedings of the Fifth International Workshop on Practice and Theory in Public Key Cryptography(PKCO2). 2002.
  • 9EIGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms[ J]. IEEE Transactions on Information Theory, 1985,31 (4) :469-472.
  • 10Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen eiphertext attack [ C ]//Advances in Cryptology Crypto "98. 1998 : 13-25.

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部