首页> 外文会议> >Mediated Traceable Anonymous Encryption
【24h】

Mediated Traceable Anonymous Encryption

机译:中介可跟踪的匿名加密

获取原文
获取原文并翻译 | 示例

摘要

The notion of key privacy for asymmetric encryption schemes was formally denned by Bellare, Boldyreva, Desai and Pointcheval in 2001: it states that an eavesdropper in possession of a ciphertext is not able to tell which specific key, out of a set of known public keys, is the one under which the ciphertext was created. Since anonymity can be misused by dishonest users, some situations could require a tracing authority capable of revoking key privacy when illegal behavior is detected. Prior works on traceable anonymous encryption miss a critical point: an encryption scheme may produce a covert channel which malicious users can use to communicate illegally using ciphertexts that trace back to nobody or, even worse, to some honest user. In this paper, we examine subliminal channels in the context of traceable anonymous encryption and we introduce a new primitive termed mediated traceable anonymous encryption that provides confidentiality and anonymity while preventing malicious users to embed subliminal messages in ciphertexts. In our model, all ciphertexts pass through a mediator (or possibly several successive mediators) and our goal is to design protocols where the absence of covert channels is guaranteed as long as the mediator is honest, while semantic security and key privacy hold even if the mediator is dishonest. We give security definitions for this new primitive and constructions meeting the formalized requirements. Our generic construction is fairly efficient, with ciphertexts that have logarithmic size in the number of group members, while preventing collusions. The security analysis requires classical complexity assumptions in the standard model.
机译:Bellare,Boldyreva,Desai和Pointcheval在2001年正式否定了非对称加密方案的密钥隐私概念:它指出,拥有密文的窃听者无法分辨出一组已知的公共密钥中的哪个特定密钥,是创建密文的基础。由于不诚实的用户可能会滥用匿名性,因此在某些情况下,可能需要跟踪机构能够在检测到非法行为时撤销关键隐私。先前关于可追溯匿名加密的工作没有抓住一个关键点:加密方案可能会产生一个秘密通道,恶意用户可以使用秘密通道来进行非法通信,而密文可以追溯到任何人,甚至更糟的是,可以追溯到某个诚实用户。在本文中,我们在可追溯匿名加密的上下文中检查了潜意识通道,并引入了一种新的称为中介的可追踪匿名加密的原始方法,该方法提供了机密性和匿名性,同时防止了恶意用户将潜意识消息嵌入密文中。在我们的模型中,所有密文都通过一个介体(或可能是几个连续的介体)传递,我们的目标是设计一种协议,只要中介是诚实的,就可以保证不存在隐蔽通道,而即使调解员是不诚实的。我们为这个新的原语和满足正式要求的结构提供安全性定义。我们的通用构造相当有效,密文的组成员数量具有对数大小,同时还能防止共谋。安全分析需要标准模型中的经典复杂性假设。

著录项

  • 来源
    《》|2010年|p.40-60|共21页
  • 会议地点 Puebla(MX);Puebla(MX)
  • 作者单位

    Universite de Versailles, 45 avenue des Etats-Unis, 78035 Versailles, France;

    Ecole normale superieure-CNRS-INRIA, 45 rue d'Ulm, 75320 Paris Cedex 05, France;

    Ecole normale superieure-CNRS-INRIA, 45 rue d'Ulm, 75320 Paris Cedex 05, France;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 设计与性能分析;
  • 关键词

  • 入库时间 2022-08-26 13:59:17

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号