电子学报 ›› 2013, Vol. 41 ›› Issue (10): 1948-1952.DOI: 10.3969/j.issn.0372-2112.2013.10.012

• 学术论文 • 上一篇    下一篇

标准模型下CCA2安全且固定密文长度的模糊基于身份加密方案

葛爱军1, 马传贵1, 程庆丰2   

  1. 1. 解放军信息工程大学数学工程与先进计算国家重点实验室, 河南郑州 450002;
    2. 解放军外国语学院基础部, 河南洛阳 471003
  • 收稿日期:2012-09-07 修回日期:2013-01-30 出版日期:2013-10-25
    • 通讯作者:
    • 马传贵
    • 作者简介:
    • 葛爱军 男,1985年出生,山东潍坊人,解放军信息工程大学博士生,主要研究方向为公钥加密、数字签名等. E-mail:geaijun@163.com 程庆丰 男,1979年出生,辽宁朝阳人,博士,解放军外国语学院讲师,主要研究方向为密码学、信息安全等. E-mail:qingfengc2008@sina.com
    • 基金资助:
    • 信息工程大学博士研究生学位论文创新基金; 国家自然科学基金 (No.61072047); 国家863高技术研究发展计划 (No.2011AA010803)

CCA2 Secure Fuzzy Identity-Based Encryption with Constant Size Ciphertexts in the Standard Model

GE Ai-jun1, MA Chuan-gui1, CHENG Qing-feng2   

  1. 1. State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University of PLA, Zhengzhou, Henan 450002, China;
    2. Deparment of Basic Courses, PLA University of Foreign Languages, Luoyang, Henan 471003, China
  • Received:2012-09-07 Revised:2013-01-30 Online:2013-10-25 Published:2013-10-25
    • Supported by:
    • Doctoral Dissertation Innovation Fund of Information Engineering University; National Natural Science Foundation of China (No.61072047); National High Technology Research and Development Program of China  (863 Program) (No.2011AA010803)

摘要: 模糊基于身份加密体制为基于身份密码提供了检错能力,并且可以把消息加密后同时发送给多个具有相同属性的用户.本文提出了一种在标准模型下能抵抗适应性选择密文攻击,并且密文长度达到了固定值的模糊基于身份加密方案.与现有方案相比,本方案占用通信带宽低,计算效率高,具有更高的安全性,因此能更好的满足应用要求.

关键词: 模糊基于身份加密, 适应性选择密文攻击, 双线性对, 标准模型

Abstract: Fuzzy identity-based encryption can provide an error-tolerance property for identity-based systems,and it allows a sender to encrypt a message to all users who have a certain set of attributes.In this paper,we proposed a fuzzy identity-based encryption scheme with constant size of ciphertexts that is indistinguishable against adaptive chosen ciphertexts attacks(CCA2)in the standard model.Compared with other existing schemes,this construction can satisfy the application requirements,as it can provide better efficiency in terms of the communication and computation cost as well as a stronger security guarantee.

Key words: fuzzy identity-based encryption, chosen ciphertexts attack, bilinear pairing, standard model

中图分类号: