文摘
英文文摘
Acknowledgements
论文说明:List of Abbreviation、List of Notation
Preface
Chapter 1 Introduction
1.1 The Fundamental Knowledge of Cryptography
1.2 Public Key Cryptography(PKC)
1.2.1 Traditional PKC
1.2.2 Identity-based PKC
1.2.3 Certificateless PKC
1.3 Public Key Encryption(PKE)
1.3.1 Definitions of Public Key Encryption
1.3.2 Security notions for Public Key Encryption
1.3.3 Proxy Re-Encryption
1.4 Threshold Decryption
1.5 Chapter Summary
Chapter 2 Preliminaries
2.1 Admissible Bilinear Parings
2.2 Diffie-Hellman Problems and Related Complexity Assumptions
2.3 Hash Functions and their Applications
2.4 Random Oracle Model
2.5 Chapter Summary
Chapter 3 A New Chosen Ciphertext Secure Certificateless Threshold Decryption Scheme from Pairing
3.1 Related Works
3.2 Security Analysis of the Certificateless Threshold Decryption Schemes in[56]
3.2.1 Review of the Basic Scheme in[56]
3.2.2 Security Analysis of the Basic Scheme
3.3 Formal Definition and Security model
3.3.1 Description of Certificateless Threshold Decryption Schemes
3.3.2 Security model for Certificateless Threshold Decryption Schemes
3.4 ANew Certificateless Threshold Decryption Scheme
3.4.1 Non-interactive proof of membership
3.4.2 A New certificateless(t,n)threshold decryption Scheme
3.5 Security of the Scheme CLThdBm
3.5.1 An ordinary threshold decryption scheme in traditional PKC
3.5.2 Statements of Lemmas
3.5.3 Proofs of Lemmas
3.6 Performance Analysis
3.7 Chapter Summary
Chapter 4 A New Ccrtificateless Proxy Re-Encryption Scheme
4.1 Rehted Works
4.2 Formal Definition and Security model
4.2.1 Description of Certificateless Proxy Re-Encryption Schemes
4.2.2 Security model for Certificateless Proxy Re-Encryption Schemes
4.3 The Concrete Construction
4.4 Security Analysis
4.5 Property Analysis
4.6 Chapter Summary
Chapter 5 Conclusions and Open Problems
5.1 Contributions of this thesis
5.2 Future Research
Bibliography
Appendix
A.1Nature Science Foundations
A.2Contributed Paper