首页 | 本学科首页   官方微博 | 高级检索  
     

两个降低PKG信任级的基于身份的门限密码体制
引用本文:龙 宇, 徐 贤, 陈克非. 两个降低PKG信任级的基于身份的门限密码体制[J]. 计算机研究与发展, 2012, 49(5): 932-938.
作者姓名:龙宇  徐贤  陈克非
作者单位:1. 上海交通大学计算机科学与工程系 上海200240;信息安全国家重点实验室(中国科学院研究生院) 北京100143
2. 华东理工大学计算机科学与工程系 上海200237
3. 上海交通大学计算机科学与工程系 上海200240
基金项目:国家自然科学基金项目,国家"九七三"重点基础研究计划基金项目,高等学校博士学科点专项科研基金项目,国家"八六三"高技术研究发展计划基金项目
摘    要:在基于身份的公钥密码体制中PKG负责生成用户密钥,对PKG的信任级别过高,存在密钥托管问题.人们为解决此问题提出了很多方案但均有一定缺陷.Goyal提出了一种解决这类问题的新思路.基于该思路,提出了两种降低对私钥生成中心的信任级别的门限密码体制.在这两个体制中,利用了Goyal提出的基于身份的可追踪公钥加密体制的思想与公开可验证加密技术,有效解决了在基于身份的门限加密体制中,PKG对同一用户恶意生成多个私钥的追踪问题.对降低PKG信任级的基于身份的门限密码体制进行了形式化定义,并在所定义的形式化安全模型下证明了这两个方案可以对抗门限自适应选择密文攻击、密钥寻找攻击以及计算新密钥攻击.

关 键 词:基于身份的公钥密码体制  门限密码体制  可证安全  可追踪  零知识证明

Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG
Long Yu, Xu Xian, Chen Kefei. Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG[J]. Journal of Computer Research and Development, 2012, 49(5): 932-938.
Authors:Long Yu    Xu Xian    Chen Kefei
Affiliation:1(Department of Computer Science and Engineering,Shanghai Jiao Tong University,Shanghai 200240) 2(Department of Computer Science and Engineering,East China University of Science and Technology,Shanghai 200237) 3(State Key Laboratory of Information Security(Graduate University of Chinese Academy of Science),Beijing 100143)
Abstract:In the traditional identity based cryptosystems,since private key generator(PKG) is able to compute the private key corresponding to any identity,the malicious activities of PKG would be hard to find,which restricts the use of identity based cryptosystems.People have employed multiple PKGs to solve this problem.However it brings other problems.In this paper,two identity based threshold cryptosystems are proposed,which reduce the trust in PKG.The traceable identity based encryption technique suggested by Goyal is used,which successfully restricts the potential misbehaviors of PKG,and the idea of public verifiable encryption which is widely used in the threshold cryptosystems to achieve distributed decryption.These two schemes solve the malicious PKG tracing problem effectively,and if PKG generates more than one private key to a single user,the misbehavior could be detected with evidence.We define the formal model of identity based threshold cryptosystem with reduced trust in PKG.We also prove the two schemes’ security against the adaptive chosen ciphertext attack,the find key attack and the compute new key attack under the formal security model.The result shows that their security is based on the truncated augmented bilinear Diffie-Hellman exponent assumption.
Keywords:identity based PKC  threshold cryptosystem  provable security  traceable  zero knowledge proof
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机研究与发展》浏览原始摘要信息
点击此处可从《计算机研究与发展》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号