首页> 外文期刊>Journal of Information Security Research >An Efficient New IBE Scheme in the Model Selective ID
【24h】

An Efficient New IBE Scheme in the Model Selective ID

机译:模型选择ID中的高效新IBE方案

获取原文
获取原文并翻译 | 示例
           

摘要

A Public-Key System (especially Identity-Based Encryption) is said to be secure if it is proved to be secure against simulation studies, taking into account the purpose of the attacker and the model used. Among the goals there are indistinguished IND and semantic goal, regarding the models, we quote Chosen Plaintext Attack (CPA),Chosen Ciphertext Attack (CCA). Their combination gives INDistinguishability under Chosen Plaintext Attack (IND-CPA), semantic-CPA, se-mantic-CCA, IND-CCA. The study considered as strong and concretizing for ideal security is IND-CCA, for the IBE we talk about IND-ID-CCA (also: semantics-ID-CPA, semantics-ID-CCA, IND-ID-CPA) . This IND-ID-CCA (as well as the others) belongs to a full domain whose identity to attack is declared in the challenge. This IND-ID-CCA (as well as the others) belongs to a full domain whose identity to attack is declared in the challenge. A so-called weak type is introduced in 2003 by Canetti et al [1] and is called selective-ID. In this model, the target identity to be attacked is declared in the beginning that is in the Setup. It is proved in [2] that the transition from selective ID to a complete domain requires a multiplication by N (produces a degradation in the security). In spite of this weakness, in Eurocrypt 2004 Bonehqp^Boyen [2] proposed two crypto systems under this type, these are the only ones known in the literature drawn up in the same type. The first is a HIBE based on the DBDHP (Decisional of Diffie and Hellman Problem) problem and under the Commutative Blinding approach it is known by BB1. While the second is an IBE Under the Exponent-Inversion approach named BB2, it is based on Dq-BDHIP (Decisional q-Invertible of Bilinear Diffie and Hellman Problem). By combining the idea of the inverse used in BB2 and remaining in the Commutative Blinding approach,In this paper we will propose our New IBE scheme [5] which will be efficient than BB1 (IBE version [4J) and even BB2.
机译:如果考虑到攻击者的目的和使用的模型,证明对模拟研究是安全的,则公钥系统(尤其是基于身份的加密)被认为是安全的。在目标中,没有区别的IND和语义目标,关于模型,我们引用选择的纯文本攻击(CPA),选择的密文攻击(CCA)。它们的组合提供了在选择的纯文本攻击(IND-CPA),语义CPA,语义CCA,IND-CCA下的可识别性。 IND-CCA被认为是实现理想安全性的强大而具体的研究,对于IBE,我们谈论IND-ID-CCA(也包括:语义ID-CPA,语义ID-CCA,IND-ID-CPA)。此IND-ID-CCA(以及其他IND-ID-CCA)属于完整域,在挑战中声明了要攻击的身份。此IND-ID-CCA(以及其他IND-ID-CCA)属于完整域,在挑战中声明了要攻击的身份。 Canetti等人[1]在2003年引入了一种所谓的弱类型,称为选择性ID。在此模型中,将在安装程序的开头声明要攻击的目标身份。在[2]中证明,从选择性ID到完整域的转换需要乘以N(导致安全性下降)。尽管存在这种弱点,但在Eurocrypt 2004中,Bonehqp ^ Boyen [2]提出了两种这种类型的加密系统,这是文献中唯一已知的相同类型的系统。第一个是基于DBDHP(Diffie和Hellman问题的决策)问题的HIBE,在可交换盲法下,BB1知道它。第二个是基于指数倒置方法的IB2,称为BB2,它基于Dq-BDHIP(双线性Diffie和Hellman问题的决策q-可逆)。通过结合BB2中使用的逆的思想并保留在交换盲法中,本文将提出新的IBE方案[5],它比BB1(IBE版本[4J]甚至BB2)更有效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号