电子学报 ›› 2018, Vol. 46 ›› Issue (7): 1675-1682.DOI: 10.3969/j.issn.0372-2112.2018.07.020
侯红霞1,2,3, 杨波1,3, 周彦伟1,3
收稿日期:
2017-02-01
修回日期:
2017-07-28
出版日期:
2018-07-25
通讯作者:
作者简介:
基金资助:
HOU Hong-xia1,2,3, YANG Bo1,3, ZHOU Yan-wei1,3
Received:
2017-02-01
Revised:
2017-07-28
Online:
2018-07-25
Published:
2018-07-25
Corresponding author:
Supported by:
摘要: 基于合数阶双线性群上的静态假设,通过在公开参数及密文中添加一个新的子群中的随机元素实现匿名性,构造了一个匿名的身份基哈希证明系统,利用对偶系统加密技术证明其满足所需的安全性质.将该哈希证明系统应用于抗泄露密码体制中,分别得到一个抗泄露的全安全匿名身份基加密方案和一个CCA-安全的抗泄露匿名身份基加密方案.
中图分类号:
侯红霞, 杨波, 周彦伟. 基于对偶系统的匿名身份基哈希证明系统及其应用[J]. 电子学报, 2018, 46(7): 1675-1682.
HOU Hong-xia, YANG Bo, ZHOU Yan-wei . Anonymous Identity-Based Hash Proof System from Dual System and Its Applications[J]. Acta Electronica Sinica, 2018, 46(7): 1675-1682.
[1] Cramer R,Shoup V.Universal Hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption[A].Proceedings of the 2002 International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin:Springer,2002.45-64. [2] Alwen J,Dodis Y,Naor M,Segev G,Walfish S,Wichs D.Public-key encryption in the bounded-retrieval model[A].Proceedings of the 2010 International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin:Springer,2010.113-134. [3] Chow S,Dodis Y,Rouselakis Y,Waters B.Practical leakage-resilient identity-based encryption from simple assumptions[A].Proceedings of the 17th ACM Conference on Computer and Communications Security[C].USA:ACM,2010.152-161. [4] Chen Y,Zhang Z,Lin D,Cao Z.Anonymous identity-based Hash proof system and its applications[A].Proceedings of the 6th International Conference on Provable Security[C].Berlin:Springer,2012.143-160. [5] Waters B.Dual system encryption:Realizing fully secure IBE and HIBE under simple assumptions[A].Proceedings of the 2009 International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin:Springer,2009.619-636. [6] Baek J,Wong D S,Li J,Au H M.Efficient generic construction of CCA-secure identity-based encryption from randomness extraction[J].The Computer Journal,2016,59(4):508-521. [7] Boyen X,Waters B.Anonymous hierarchical identity-based encryption(without random oracles)[A].Proceedings of the 26th Annual International Cryptology Conference[C].Berlin:Springer,2006.290-307. [8] Wee H.Déjà Q:Encore! Un Petit IBE[A].Proceedings of the 13th Theory of Cryptography Conference[C].Berlin:Springer,2016.237-258. [9] 王皓,徐秋亮.抗适应性选择身份攻击的匿名HIBE方案[J].计算机学报,2011,34(1):25-37. Wang H,Xu Q.Anonymous HIBE scheme secure against full adaptive-ID attacks[J].Chinese Journal of Computers,2011,34(1):25-37.(in Chinese) [10] De Caro A,Iovino V,Persiano G.Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts[A].Proceedings of the 4th Pairing Based Cryptography[C].Berlin:Springer,2010.347-366. [11] Hu C,Yang R,Liu P,Yu Z,Zhou Y,Xu Q.Public-key encryption with keyword search secure against continual memory attacks[J].Security and Communication Networks,2016,9:1613-1629. [12] Boneh D,Franklin M.Identity-based encryption from the Weil pairing[A].Proceedings of the 2001 International Cryptology Conference[C].Berlin:Springer,2001.213-229. [13] Gentry C.Practical identity-based encryption without random oracles[A].Proceedings of the 2006 International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin:Springer,2006.445-464. [14] Lewko A,Rouselakis Y,Waters B.Achieving leakage resilience through dual system encryption[A].Proceedings of the 8th Theory of Cryptography Conference[C].Berlin:Springer,2011.70-88. |
[1] | 宋昭阳, 王一诺, 王浩文, 马鸿洋. 基于Hopfield网络“伪吸引子”与交替量子随机行走的抗攻击彩色图像加密方案[J]. 电子学报, 2023, (): 1-13. |
[2] | 曾卓, 汪成亮, 马飞. 基于差分隐私的活动模式保护与时空轨迹发布方法[J]. 电子学报, 2023, 51(3): 552-563. |
[3] | 赵开强, 康萍, 刘彬, 郭真, 冯朝胜, 卿昱. 支持云代理重加密的CP-ABE方案[J]. 电子学报, 2023, 51(3): 728-735. |
[4] | 张丹丹, 宋亚飞, 刘曙. MalMKNet:一种用于恶意代码分类的多尺度卷积神经网络[J]. 电子学报, 2023, (): 1-11. |
[5] | 唐飞, 冯卓, 黄永洪. 基于区块链的公平可验证数据持有方案[J]. 电子学报, 2023, 51(2): 406-415. |
[6] | 郭庆, 田有亮, 万良. 基于代理重加密的区块链数据受控共享方案[J]. 电子学报, 2023, 51(2): 477-488. |
[7] | 王经纬, 吴静雯, 殷新春. 抗共谋攻击的多授权电子健康记录共享方案[J]. 电子学报, 2023, (): 1-8. |
[8] | 王硕, 王坚, 王亚男, 宋亚飞. 一种基于特征融合的恶意代码快速检测方法[J]. 电子学报, 2023, 51(1): 57-66. |
[9] | 田晖, 严艳, 汤莉莉, 吴俊彦, 王慧东, 全韩彧. 基于分数基音延迟动态搜索的语音隐写算法[J]. 电子学报, 2023, 51(1): 67-75. |
[10] | 李顺东, 赵雪玲, 家珠亮. 集合交集元素和的保密计算[J]. 电子学报, 2023, 51(1): 86-92. |
[11] | 轩勃娜, 李进. 基于改进CNN的恶意软件分类方法[J]. 电子学报, 2022, (): 1-11. |
[12] | 郑锐, 汪秋云, 林卓庞, 靖蓉琦, 姜政伟, 傅建明, 汪姝玮. 一种基于威胁情报层次特征集成的挖矿恶意软件检测方法[J]. 电子学报, 2022, 50(11): 2707-2715. |
[13] | 蔡莹, 朱翔, 王舰, 李昊远, 韩建伟. 基于激光注入的FPGA加密防护设计验证研究[J]. 电子学报, 2022, 50(10): 2381-2386. |
[14] | 任正伟, 李雪婷, 王丽娜, 童言, 徐士伟, 丁炜. 云存储中外包数据确定性删除研究综述[J]. 电子学报, 2022, 50(10): 2542-2560. |
[15] | 徐明, 胡沐宇. 窃听信道下基于双分簇技术的信源安全有损传输[J]. 电子学报, 2022, 50(9): 2196-2204. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||