通信学报 ›› 2013, Vol. 34 ›› Issue (7): 87-97.doi: 10.3969/j.issn.1000-436x.2013.07.010

• 学术论文 • 上一篇    下一篇

高效的选择密文安全的单向代理重加密方案

张维纬1,2,张茹1,2,刘建毅1,2,钮心忻1,2,杨义先1,2   

  1. 1 北京邮电大学 信息安全中心,北京 100876;
    2 北京邮电大学 灾备技术国家工程实验室,北京 100876
  • 出版日期:2013-07-25 发布日期:2017-06-24
  • 基金资助:
    国家自然科学基金资助项目;北京市自然科学基金资助项目;中央高校基本科研业务费专项基金资助项目;新闻出版重大科技工程项目研发“数字版权保护技术研发工程”基金资助项目;新闻出版重大科技工程项目研发“数字版权保护技术研发工程”基金资助项目

Efficient chosen-ciphertext secure proxy re-encryption scheme

Wei-wei ZHANG1,2,Ru ZHANG1,2,Jian-yi LIU1,2,Xin-xin NIU1,2,Yi-xian YANG1,2   

  1. 1 Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China;
    2 National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Online:2013-07-25 Published:2017-06-24
  • Supported by:
    The National Natural Science Foundation of China;Beijing Municipal Natural Science Founda-tion;The Fundamental Research Funds for the l Universities;Press and Publication of Major Science and Technology Research and Development Projects“Digital Rights Protection Technology Research and Deve Project”;Press and Publication of Major Science and Technology Research and Development Projects“Digital Rights Protection Technology Research and Deve Project”

摘要:

针对如何构造一个在标准模型下高效的选择密文安全的单向代理重加密方案这个问题,提出了一种新的、高效的单向代理重加密方案,并且在标准模型下证明了方案在自适应攻陷模型下的选择密文安全性。所提方案与LV方案相比,在安全性和效率方面都有所提升,与WJ方案相比,在同等安全条件下,运算效率有所提高。

关键词: 代理重加密, 选择密文安全, 自适应攻陷模型, 标准模型

Abstract:

In order to construct an efficient and chosen-chiphertext secure unidirectional re-encryption scheme in the standard model,a novel and efficient unidirectional proxy re-encryption scheme was proposed, and its chosen-ciphertext security in the adaptive corruption model was proved in the standard model. Compared with LV scheme, this scheme has the advantages of both higher efficiency and stronger curity. Under the same security level, this scheme has lower computational cost than that of WJ scheme.

Key words: proxy re-encryption, chosen-ciphertext security, adaptive corruption model, standard model

No Suggested Reading articles found!