支持灵活授权的基于身份的加密相等性测试方案
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Identity-Based Encryption with Equality Test Scheme Supporting Flexible Authorization
  • 作者:张琦 ; 李嘉伟 ; 林喜军 ; 曲海鹏
  • 英文作者:ZHANG Qi;LI Jiawei;LIN Xijun;QU Haipeng;College of Information Science and Engineering,Ocean University of China;
  • 关键词:基于身份的加密 ; 相等性测试 ; 公有云 ; 灵活授权 ; 隐私保护
  • 英文关键词:Identity-Based Encryption(IBE);;equality test;;public cloud;;flexible authorization;;privacy protection
  • 中文刊名:JSJC
  • 英文刊名:Computer Engineering
  • 机构:中国海洋大学信息科学与工程学院;
  • 出版日期:2018-11-05 16:39
  • 出版单位:计算机工程
  • 年:2019
  • 期:v.45;No.502
  • 基金:国家自然科学基金(61379127)
  • 语种:中文;
  • 页:JSJC201907028
  • 页数:5
  • CN:07
  • ISSN:31-1289/TP
  • 分类号:182-186
摘要
基于身份的加密相等性测试(IBEET)方案可在保证数据机密性的同时简化密钥和证书的管理,但其缺少对授权粒度的控制,难以满足实际应用中不同数据粒度的管理需求。为此,引入任意用户级别、任意密文级别、指定用户级别和密文-用户级别4种不同类型的授权机制,基于非对称的双线性映射,构建支持灵活授权的IBEET方案,并给出相关定义及安全模型。分析结果表明,该方案具有OW-ID-CCA安全性,能实现用户隐私保护。
        The Identity-Based Encryption with Equality Test(IBEET) scheme can simplify the management of keys and certificates while ensuring data confidentiality,but it lacks control over the granularity of authorization,making it difficult to meet the management needs of different data granularities in practical applications.Therefore,random user level,random ciphertex level,specified user level and ciphertext-user level mechanisms are introduced.Based on asymmetric bilinear mapping,an IBEET scheme supporting flexible authorization is constructed,and related definitions and security models are given.The analysis results show that the scheme has the OW-ID-CCA security and can realize user privacy protection.
引文
[1] 曾梦岐,卿昱,谭平璋,等.基于身份的加密体制研究综述[J].计算机应用研究,2010,27(1):27-31.
    [2] SHAMIR A.Identity-based cryptosystems and signature schemes[C]//Proceedings of Workshop on the Theory and Application of Cryptographic Techniques.Berlin,Germany:Springer,1984:47-53.
    [3] MCCULLAGH N.Securing E-mail with identity-based encryption[J].IT Professional,2005,7(3):63-64.
    [4] DAN B,FRANKLIN M.Identity-based encryption from the Weil pairing[C]//Proceedings of Annual International Cryptology Conference.Berlin,Germany:Springer,2001:213-229.
    [5] SAHAI A,WATERS B.Fuzzy identity-based encryption[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2005:457-473.
    [6] DAN B,BOYEN X.Efficient selective-ID secure identity-based encryption without random Oracles[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2004:223-238.
    [7] WATERS B.Efficient identity-based encryption without random Oracles[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2005:114-127.
    [8] 陈辉焱,刘乐,张晨晨.一种具有CDH问题安全性基于身份的签名方案[J].计算机工程,2018,44(4):174-180.
    [9] MA Sha.Identity-based encryption with outsourced equality test in cloud computing[J].Information Sciences an International Journal,2016,328(C):389-402.
    [10] TANG Qiang.Towards public key encryption scheme supporting equality test with fine-grained authori-zation[C]//Proceedings of Australasian Conference on Information Security and Privacy.Berlin,Germany:Springer,2011:289-406.
    [11] YANG Guomin,TAN C H,HUANG Qiong,et al.Probabilistic public key encryption with equality test[C]//Proceedings of Cryptographers’ Track at the RSA Conference.Berlin,Germany:Springer,2010:119-131.
    [12] LEE H T,LING S,SEO J H,et al.Semi-generic construction of public key encryption and identity-based encryption with equality test[J].Information Sciences,2016,373(C):419-440.
    [13] WU Libing,ZHANG Yubo,CHOO K K R,et al.Efficient and secure identity-based encryption scheme with equality test in cloud computing[J].Future Generation Computer Systems,2017,73(C):22-31.
    [14] 吴黎兵,张宇波,何德彪.云计算中基于身份的双服务器密文等值判定协议[J].计算机研究与发展,2017,54(10):2232-2243.
    [15] TANG Qiang.Public key encryption schemes supporting equality test with authorisation of different granularity[J].International Journal of Applied Cryptography,2017,2(4):304-321.
    [16] 计海萍,徐磊,蔚晓玲,等.云计算环境下基于身份的分层加密管理系统研究[J].信息网络安全,2016,16(5):30-36.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700