《计算机应用研究》|Application Research of Computers

两个公钥加密方案的安全性分析

Security analysis of two public key encryption schemes

免费全文下载 (已被下载 次)  
获取PDF全文
作者 解理,任艳丽
机构 上海大学 通信与信息工程学院,上海 200444
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2015)01-0218-04
DOI 10.3969/j.issn.1001-3695.2015.01.050
摘要 广播加密和基于属性加密是两种重要的公钥加密方案,可将加密内容同时传送给多个用户,在付费电视、数字版权管理和资源访问控制等领域有重要应用。对一个基于身份广播加密方案进行了分析,表明攻击者只要得到某个用户的私钥,就可以计算其他任何用户的私钥。研究了一个基于属性加密方案,该方案并不能真正地隐藏访问结构,攻击者仅由密文就能得到对应的访问结构。
关键词 基于身份;广播加密;基于属性加密;密码分析
基金项目 国家自然科学基金资助项目(61202367)
上海市自然科学基金资助项目(12ZR1443700)
上海市教委创新基金资助项目(14YZ020)
本文URL http://www.arocmag.com/article/01-2015-01-050.html
英文标题 Security analysis of two public key encryption schemes
作者英文名 XIE Li, REN Yan-li
机构英文名 School of Communication & Information Engineering, Shanghai University, Shanghai 200444, China
英文摘要 Broadcast encryption (BE) and attribute-based encryption (ABE) schemes are two kinds of important public key encryption schemes, which can transmit an encrypted message to a lot of users simultaneously, and has significant application in many fields such as Pay-TV, digital copyright management and resource access control and so on. This paper first analyzed an identity-based BE (IBBE) scheme and the result shows that the attacker can compute the private key of any other user if it can obtain the key of one user. It also studied an ABE scheme, and proved that the scheme cannot really hide the access structure and the attacker can get the associated access structure only from a ciphertext.
英文关键词 identity-based; broadcast encryption; attributed-based encryption; cryptanalysis
参考文献 查看稿件参考文献
  [1] SHAMIR A. Identity-based cryptosystems and signature schemes[C] //Proc of the 4th Annual International Cryptology Conference. 1985:47-53.
[2] FIAT A, NAOR M. Broadcast encryption[C] //Proc of the 13th Annual International Cryptology Conference. 1994:480-491.
[3] DELERABLEE C. Identity-based broadcast encryption with constant size ciphertexts and private keys[C] //Proc of the 13th Annual International Conference on Theory and Application of Cryptology and Information Security. 2007:200-215.
[4] GENTRY C, WATERS B. Adaptive security in broadcast encryption systems (with short ciphertexts)[C] //Proc of the 28th Annual International Conference on Theory and Applications of Cryptographic Techniques. 2009:171-188.
[5] ZHAO Xing-wen, ZHANG Fang-guo. Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority[J] . Journal of Systems and Software, 2012, 85(3):708-716.
[6] FAN C I, HWANG L Y, HO P H. Anonymous multireceiver identity-based encryption[J] . IEEE Trans on Computers, 2010, 59(9):1239-1249.
[7] HUR J, PARK C, HWANG S. Privacy-preserving identity-based broadcast encryption[J] . Information Fusion, 2012, 13(4):296-303.
[8] FAZIO N, PERERA I. Outsider-anonymous broadcast encryption with sublinear ciphertexts[C] //Proc of the 15th Annual International Conference on Practice and Theory in Public Key Cryptography. 2012:225-242.
[9] LIBERT B, PATERSON G, QUAGLIA A. Anonymous broadcast encryption:adaptive security and efficient constructions in the standard model[C] //Proc of the 15th Annual International Conference on Practice and Theory in Public Key Cryptography. 2012:206-224.
[10] 孙谨, 胡予濮. 双系统密码技术下的身份型广播加密方案[J] . 电子与信息学报, 2011, 33(5):1266-1270.
[11] SAHAI A, WATERS B. Fuzzy identity-based encryption[C] //Proc of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques. 2005:457-473.
[12] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C] //Proc of the 13th ACM Conference on Computer and Communications Security 2006. New York:ACM Press, 2006:89-98.
[13] NISHIDE T, YONEYAMA K, OHTA K. Attribute-based encryption with partially hidden encryptor-specified access structures[C] //Proc of the 6th International Conference on Applied Cryptography and Network Security. 2008:111-129.
[14] LI Jin, REN Kui, ZHU Bo, et al. Privacy-aware attribute-based encryption with user accountability[C] //Lecture Notes in Computer Science, vol 5735. Berlin:Springer, 2009:347-362.
[15] LAI Jun-zuo, DENG R H, LI Ying-jiu. Fully secure cipertext-policy hiding CP-ABE[C] //Proc of the 7th International Conference on Information Security Practice and Experience. 2011:24-39.
[16] LI Xiao-hui, GU Da-wu, REN Yan-li, et al. Efficient ciphertextpolicy attribute based encryption with hidden policy[C] //Proc of the 5th International Conference on Internet and Distributed Computing Systems. 2012:146-159.
[17] 王海滨, 陈少真. 隐藏访问结构的基于属性加密方案[J] . 电子与信息学报, 2012, 34(2):457-461.
[18] BONEH D, GOH E, NISSIM K. Evaluating 2-DNF formulas on ciphertexts[C] //Proc of the 2nd International Conference on Theory of Cryptography. Berlin:Springer-Verlag, 2005:325-341.
[19] LEWKO A, WATERS B. New techniques for dual system encryption and fully secure HIBE with short ciphertexts[C] //Proc of the 7th International Conference on Theory of Cryptography. Berlin:Springer-Verlag, 2010:455-479.
[20] 任艳丽, 张新鹏, 钱振兴. 素数阶群中基于身份的匿名加密方案[J] . 北京邮电大学学报, 2013, 36(5):96-98.
收稿日期 2014/1/7
修回日期 2014/2/28
页码 218-221
中图分类号 TP309.7
文献标志码 A