高级检索
    陆 阳 李继国. 标准模型下高效安全的基于证书密钥封装机制[J]. 计算机研究与发展, 2014, 51(7): 1497-1505.
    引用本文: 陆 阳 李继国. 标准模型下高效安全的基于证书密钥封装机制[J]. 计算机研究与发展, 2014, 51(7): 1497-1505.
    Lu Yang and Li Jiguo. Efficient and Provably-Secure Certificate-Based Key Encapsulation Mechanism in the Standard Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1497-1505.
    Citation: Lu Yang and Li Jiguo. Efficient and Provably-Secure Certificate-Based Key Encapsulation Mechanism in the Standard Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1497-1505.

    标准模型下高效安全的基于证书密钥封装机制

    Efficient and Provably-Secure Certificate-Based Key Encapsulation Mechanism in the Standard Model

    • 摘要: 基于证书密码体制有机结合了传统公钥密码体制和基于身份密码体制,不仅克服了基于身份密码体制固有的密钥托管和密钥分发问题,而且简化了传统公钥基础设施中复杂的公钥证书管理,是一种颇受关注的新型公钥密码体制.基于证书密钥封装机制,将密钥封装机制与基于证书密码体制相结合,具备基于证书密码体制的优良特性.基于双线性对,提出了一个高效的并且可证明安全的基于证书密钥封装机制方案.在标准模型下基于判定性截断q-ABDHE问题和判定性1-BDHI问题的困难性,该方案被证明满足适应性选择密文攻击下的不可区分安全性,即满足选择密文安全性.与已有的标准模型下安全的基于证书密钥封装机制方案相比,该方案具有更高的计算效率和更低的通信带宽要求.

       

      Abstract: Certificate-based cryptography is a new cryptographic paradigm that provides an interesting balance between identity-based cryptography and traditional public-key cryptography. It not only eliminates the third-party query problem and simplifies the complicated public-key certificate management problem in the traditional public-key infrastructure, but also solves the key escrow and key distribution problems inherent in identity-based cryptography. As an extension of key encapsulation mechanism in the certificate-based setting, certificate-based key encapsulation mechanism preserves some of the most attractive features of certificate-based cryptography. In this paper, we propose an efficient certificate-based key encapsulation mechanism from bilinear pairings which is provably-secure without the random oracle model. Under the hardness of the truncated decision q-augmented bilinear Diffie-Hellman exponent problem and the decision 1-bilinear Diffie-Hellman inversion problem, we prove in the standard model that the proposed scheme achieves indistinguishable security under adaptive chosen-ciphertext attacks. The proposed scheme is quite efficient in the computation. Its performance is competitive with the existing certificate-based key encapsulation mechanism in the random oracle model. Compared with the existing certificate-based key encapsulation mechanism in the standard model, the proposed scheme enjoys less computation cost and lower communication bandwidth, and hence, it outperforms the known standard-model certificate-based key encapsulation mechanism in the literature.

       

    /

    返回文章
    返回