首页 | 本学科首页   官方微博 | 高级检索  
     

基于身份的条件型广播代理重加密方案
引用本文:潘 峰,葛运龙,张 倩,申军伟. 基于身份的条件型广播代理重加密方案[J]. 计算机应用, 2014, 34(4): 1038-1041. DOI: 10.11772/j.issn.1001-9081.2014.04.1038
作者姓名:潘 峰  葛运龙  张 倩  申军伟
作者单位:1. 网络与信息安全武警部队重点实验室(武警工程大学),西安 710086;2. 武警工程大学 网络与信息安全研究所,西安 710086;3. 武警警官学院 电子技术系,成都 610213
基金项目:国家自然科学基金资助项目;陕西省自然科学基金资助项目
摘    要:在传统的代理重加密(PRE)体制中,代理者一旦获得重加密密钥就能将所有授权者能解密的密文转换成受理者能解密的密文,代理者的重加密权限过大;而且授权者需要对不同的受理者生成代理重加密密钥,计算过程中浪费了大量的资源。为了解决以上问题,构造了一种基于身份的条件型广播代理重加密方案。该方案中的授权者在生成重加密密钥过程中加入特殊条件,来限制代理者的重加密权限过大的问题;与此同时,使授权者的密文能够被再次广播以确保重要通信,这样的处理能节省更多的计算和通信开销。最后通过理论分析阐明了方案的安全性。

关 键 词:广播加密  代理重加密  重加密权限
收稿时间:2013-09-12
修稿时间:2013-11-12

Identity-based conditional proxy broadcast re-encryption
PAN Feng GE Yunlong ZHANG Qian SHEN Junwei. Identity-based conditional proxy broadcast re-encryption[J]. Journal of Computer Applications, 2014, 34(4): 1038-1041. DOI: 10.11772/j.issn.1001-9081.2014.04.1038
Authors:PAN Feng GE Yunlong ZHANG Qian SHEN Junwei
Affiliation:1. Institute of Network and Information Security, Engineering University of Armed Police Force, Xi'an Shaanxi 710086, China
2. Key Laboratory of Network and Information Security (Engineering University of Armed Police Force), Xi'an Shaanxi 710086, China
3. Department of Electronic Technology, Officers College of CAPF, Chengdu Sichuan 610213, China
Abstract:In traditional Proxy Re-Encryption (PRE), a proxy is too powerful as it has the ability to re-encrypt all delegator's ciphertexts to delegatee once the re-encryption key is obtained; And for more than one delegatees, delegator needs to generate different re-encryption key for different delegatee, which wastes a lot of resources in the calculation process. To solve these problems, an identity-based conditional proxy broadcast re-encryption was introduced. The delegator generated a re-encryption key for some specified condition during the encryption, like that the re-encryption authority of the proxy was restricted to that condition only. Moreover, the delegator's ciphertexts could be re-broadcasted to ensure the important communication and save a lot of computation and communication cost. Finally, the theoretical analysis verified the security of the scheme.
Keywords:
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号