首页 | 本学科首页   官方微博 | 高级检索  
     

将一个IRPKE方案改为IRIBE方案的方法研究
引用本文:郭 庆,刘振钧,房利国,余 海. 将一个IRPKE方案改为IRIBE方案的方法研究[J]. 通信技术, 2015, 48(10): 1187-1181. DOI: 10.3969/j.issn.1002-0802.2015.10.018
作者姓名:郭 庆  刘振钧  房利国  余 海
作者单位:中国电子科技集团公司第三十研究所,四川 成都 610041
摘    要:假定解密密钥绝对安全是传统加密方案安全性的必要前提。但是,在众多应用场景下解密密钥通常是无法保证绝对安全的。于是,许多密码专家都对入侵容忍加密方案进行了大量研究。通过对一个入侵容忍公钥加密(IRPKE)方案公钥分发机制的研究,提出了一种将IRPKE改为入侵容忍基于身份加密方案(IRIBE)的方法,在不改变原IRPKE方案的安全特性的情况下,解决了系统新增用户时公钥分发困难的问题,更好地满足了信息孤岛间交换信息的密码应用需求。

关 键 词:入侵容忍加密  IRPKE  IRIBE  密钥分发  
收稿时间:2015-05-18

A Method of Transforming IRPKE into IRIBE Scheme
GUO Qing,LIU Zhen-jun,FANG Li-guo,YU Hai. A Method of Transforming IRPKE into IRIBE Scheme[J]. Communications Technology, 2015, 48(10): 1187-1181. DOI: 10.3969/j.issn.1002-0802.2015.10.018
Authors:GUO Qing  LIU Zhen-jun  FANG Li-guo  YU Hai
Affiliation:No.30 Institute of CETC, Chengdu Sichuan 610041, China
Abstract:Assume that the absolute security of decryption key is a prerequisite of conventional encryption security. However, the security of decryption key could not be guaranteed in numerous application scenarios. Thus, many cryptanalysts do a lot of research on intrusion-resilient encryption scheme. Through studying the public key distribution mechanism of IRPKE (Intrusion-Resilient Public-Key Encryption) scheme, an approach to transforming IRPKE into IRIBE (Intrusion-Resilient Identity-based Encryption) scheme is proposed. Without changing the original security characteristics of the IRPKE, IRIBE could fairly solve the problem of public key distribution when the system is newly added user, and it is better to meet the application requirements of information exchange between information silos.
Keywords:intrusion-resilient encryption  IRPKE  IRIBE  key distribution  
点击此处可从《通信技术》浏览原始摘要信息
点击此处可从《通信技术》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号