CN106130992A - The level identity base encipherment scheme of attack is opened in anti-selection - Google Patents

The level identity base encipherment scheme of attack is opened in anti-selection Download PDF

Info

Publication number
CN106130992A
CN106130992A CN201610509858.XA CN201610509858A CN106130992A CN 106130992 A CN106130992 A CN 106130992A CN 201610509858 A CN201610509858 A CN 201610509858A CN 106130992 A CN106130992 A CN 106130992A
Authority
CN
China
Prior art keywords
private key
opponent
challenger
attack
selection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610509858.XA
Other languages
Chinese (zh)
Other versions
CN106130992B (en
Inventor
刘建伟
周星光
刘巍然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN201610509858.XA priority Critical patent/CN106130992B/en
Publication of CN106130992A publication Critical patent/CN106130992A/en
Application granted granted Critical
Publication of CN106130992B publication Critical patent/CN106130992B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of anti-selection and open the level identity base encipherment scheme of attack, comprise the following steps: set up, by the game between definition opponent and challenger, the security model that the level identity based system of attack is opened in anti-selection;Have the 1 monolateral opening function of bit by proof, the undistinguishable model of level identity base has the safety of undistinguishable chosen-plain attact proves that the safety of the security model of the level identity based system of attack is opened in anti-selection.The program can overcome the deficiency of existing Semantic Security model, it is adaptable to the network environment of multi-party communication and the system of layering framework.

Description

The level identity base encipherment scheme of attack is opened in anti-selection
Technical field
The present invention relates to field of information security technology, open the level identity base encryption of attack particularly to a kind of anti-selection Scheme.
Background technology
Networked environment makes information system increasingly sophisticated, and the requirement of security performance is also not quite similar by different environment, The security strategy taked also has multiformity.Such as, in Secure computing environment, multiple senders can use public key encryption Send cipher-text information to same recipient, and the plaintext of the many correspondences of these ciphertexts is likely to be mutually related.Enemy may Penetration attack can be carried out, obtain all of information of some sender, including the random number in plain text and used by encryption.Traditional only The undistinguishable model (also can become Semantic Security model) relating to two square tube letters, it is difficult to ensure that its safety, needs new safety Model, to ensure the confidentiality of confidential information added by those communication entities not permeated by opponent.
In order to tackle the attack under these complex environments, researchers propose the security model selecting to open attack.Choosing Select and open opponent in security model there is higher attacking ability, show as penetration attack, it may be assumed that opponent can open with unrestricted choice Which ciphertext, and obtain plaintext and the random number being correlated with.In correlation technique, peace is opened in selection based on conventional public-key encryption system The research of full model is the most ripe, and such as Bellare in 2009 etc. propose the method damaging encryption to realize selecting peace in plain text Attack model is opened in complete anti-selection, and Fehr in 2010 etc. are based on denying AES and non-conformant encryption mechanism, utilization The ambiguity of ciphertext achieves and selects the anti-selection of ciphertext safety to open attack model.It is applied to the anti-choosing of identity based encryption system Select and open attack option the most day by day maturation.1 bit is monolateral public opens system by building for Waters, Bellare etc. in 2010 And then achieve and select the anti-selection of plaintext secure to open attack model, Liu Shengli in 2014 etc. are can extract monolateral public open Identity basic mode type based on, realize know clearly select ciphertext safety anti-selection open attack model.
But, for level identity based encryption system, correlation technique is not applied to anti-selection therein and opens and attack The security model hit, and level identity based system has a lot of application scenarios in routine work in life especially, such as typical case Medical system, campus system, large enterprise etc. there is the system of hierarchical organization structure.In these systems, senior staff is permissible Authorize junior staff and distribute key for them, thus forming tree.The corresponding work of each node on tree Make personnel.In such network environment, when certain several node (as sender) sends associated with each other to another node When adding confidential information, the penetration attack of opponent can be faced equally, open the security model of attack resist so needing also exist for anti-selection Opponent attacks.
Summary of the invention
It is contemplated that the technical problem solved the most to a certain extent in correlation technique.
To this end, it is an object of the invention to propose a kind of anti-selection to open the level identity base encipherment scheme of attack, the party Case can overcome the deficiency of existing Semantic Security model, simple easily realization.
For reaching above-mentioned purpose, the embodiment of the present invention proposes a kind of anti-selection and opens the level identity base encryption side of attack Case, comprises the following steps: sets up anti-selection by the game between definition opponent and challenger and opens the level identity base of attack The security model of system, described is defined including to the game between opponent and challenger: initial phase: described opponent's sound Bright challenge identity vector;System establishment stage: described challenger's call parameters generating algorithm generates common parameter, and by described public affairs Parameter sends to described opponent altogether;Private key puts question to inquiry: described opponent to private key corresponding to described challenger's inquiry identity vector, Wherein, described identity vector can not be the identity vector of statement in described initial phase;The challenge stage: described opponent output is wanted The identity vector of challenge, the message vector of efficiently sampling, PKI parameter and random number to described challenger, described challenger calls AES generates cyphertext vector and returns to described opponent;Opening stage: described opponent selects a set to send to described Challenger, in order to described challenger opens corresponding cyphertext component and obtains in plain text and random number, and described challenger selects at random Selecting a bit, wherein, if bit is 1, the information opened is sent to described opponent by the most described challenger, if bit is 0, the most described challenger samples to send to described opponent new plaintext component again;The conjecture stage: described opponent exports one Individual conjecture result, if described conjecture result is correct, the most described opponent wins in gaming;By proof, there is 1 bit monolateral The safety that opening function, the undistinguishable model of level identity base have undistinguishable chosen-plain attact is described anti-to prove Select to open the safety of the security model of the level identity based system of attack.
The level identity base encipherment scheme of attack is opened in the anti-selection of the embodiment of the present invention, and attack is opened in the anti-selection of selection Model can successfully manage many-to-one communication pattern in complex network environment, prevents because assailant has stolen the letter of a hop link Cease and then attacked all links, caused network paralysis, secondly, attack model being opened in anti-selection and effectively applies to level body In part based encryption system, extremely mate with real-life sight, can be applicable to large-scale there is sophistication levels structure be In system, simple easily realization.
It addition, the level identity base encipherment scheme that attack is opened in anti-selection according to the above embodiment of the present invention can also have There is a following additional technical characteristic:
Further, in one embodiment of the invention, there is described in structure the 1 monolateral opening function of bit, level body The undistinguishable model of part base, farther includes: system is set up: according to closing number rank Bilinear GroupsExponent number random with choose Number is set up algorithm by system and is generated main private key and PKI;Private key generates: according to the random number chosen by private key generating algorithm Generate the private key of the first level;Private key escrow: according to the private key of last layer node, the atom identity of current hierarchy node and choose The 3rd random number obtained the private key of current level by private key escrow algorithm;Encryption: by AES to adding in plain text Close, to obtain ciphertext, wherein, by the ciphertext of default structure, digital ratio is encrypted specially for the plaintext of 0 bit, and by choosing Take the random number ciphertext as single-bit 1;Deciphering: by decipherment algorithm, described ciphertext is decrypted, to recover described plaintext.
Further, in one embodiment of the invention, also include: decrypted result is carried out verification of correctness.
Further, in one embodiment of the invention, the current level generated by described private key escrow algorithm Private key form keeps consistent with the private key form of the first level generated by described private key generating algorithm.
Aspect and advantage that the present invention adds will part be given in the following description, and part will become from the following description Obtain substantially, or recognized by the practice of the present invention.
Accompanying drawing explanation
The present invention above-mentioned and/or that add aspect and advantage will become from the following description of the accompanying drawings of embodiments Substantially with easy to understand, wherein:
Fig. 1 is the flow chart that the level identity base encipherment scheme of attack is opened in the anti-selection according to the embodiment of the present invention;
Fig. 2 is, according to one embodiment of the invention, the game between opponent and challenger is defined flow chart;
Fig. 3 be according to one embodiment of the invention construct have the 1 monolateral opening function of bit, level identity base can not Distinguish the structure flow chart of model.
Detailed description of the invention
Embodiments of the invention are described below in detail, and the example of described embodiment is shown in the drawings, the most from start to finish Same or similar label represents same or similar element or has the element of same or like function.Below with reference to attached The embodiment that figure describes is exemplary, it is intended to is used for explaining the present invention, and is not considered as limiting the invention.
Describe the anti-selection proposed according to embodiments of the present invention with reference to the accompanying drawings and open the level identity base encryption of attack Scheme.
Fig. 1 is the flow chart that the level identity base encipherment scheme of attack is opened in the anti-selection of the embodiment of the present invention.
As it is shown in figure 1, the level identity base encipherment scheme that attack is opened in this anti-selection comprises the following steps:
In step S101, set up anti-selection by the game between definition opponent and challenger and open the level body of attack The security model of part based system.
It is understood that the embodiment of the present invention make use of based on the monolateral level identity based system opening attribute of 1 bit With based on 1 ratio in the safety of dual system level identity based system.Specifically, initially set up anti-selection and open the level body of attack The security model of part based system.Security model is generally defined by the game between opponent and challenger, wherein, as in figure 2 it is shown, It is defined including to the game between opponent and challenger:
Step S201, initial phase: opponent states challenge identity vector.I.e. saying, in initial phase, opponent states One its identity vector to be attackedCan referred to as challenge identity vector.
Step S202, system establishment stage: challenger's call parameters generating algorithm generates common parameter, and by common parameter Send to opponent.It is to say, in system establishment stage, challenger's call parameters generating algorithm generates common parameter and (includes PKI and main private key), and common parameter is sent to opponent.
Step S203, private key puts question to inquiry: opponent is to private key corresponding to challenger's inquiry identity vector, wherein, identity to Amount can not be the identity vector of statement in initial phase.Specifically, opponent's inquiry identityCorresponding private key, challenger can Obtain with operation private key generating algorithmCorresponding private key also sends it to opponent.It should be noted that hereNo It can be challenge identity vectorThe prefix of itself and it is (i.e.Can not be the superior node of challenge identity vector).
Step S204, challenges the stage: opponent's output identity vector to be challenged, the message vector of efficiently sampling, PKI are joined Number and random number are to challenger, and challenger calls AES and generates cyphertext vector and return to opponent.Specifically, opponent is to choosing War person exports the identity vector that it is to be challengedAnd can be with the message vector M=of efficiently sampling (M1,M2,...,Mn), PKI parameter and random number r=(r1,r2,...,rn).Challenger calls AES and generates cyphertext vector C=(C1,C2,...,Cn), and it is returned to opponent.
Step S205, opening stage: opponent selects a set to send to challenger, in order to challenger opens the closeest Literary composition component obtains in plain text and random number, and challenger randomly chooses a bit, and wherein, if bit is 1, then challenger will The information opened sends to opponent, if bit is 0, then challenger samples to send to opponent new plaintext component again.
Such as, opponent selects a setIt is sent to challenger.Challenger opens corresponding ciphertext and divides Measure plaintext and random number (Mk,rk)k∈K.Challenger randomly chooses a bit b again.If b=1, challenger will open Information (Mk,rk)k∈KIt is sent to opponent.If b=0, challenger then samples again according to the probability distribution of M, obtains new plaintext Component (M'k)k∈KIt is sent to opponent.
Step S206, guesses the stage: opponent exports a conjecture result, if conjecture result is correct, then opponent is in game Middle triumph.Being equivalent to, opponent exports a conjecture b'.The b'=b if opponent hits it, announces that opponent wins in gaming.
Secondly, it was demonstrated that the safety of above-mentioned model.Above-mentioned model is that bit more than selects to open attack model, its peace Full property can reduction be finally the 1 monolateral public safety opening model of bit.So core point is by based on many bits, level body The anti-selection of part base is opened the safety reduction of model and is had the 1 monolateral opening function of bit, the undistinguishable mould of level identity base The safety of type.
Finally, construct one and there is the 1 monolateral opening function of bit, the undistinguishable model of level identity base, and prove to be somebody's turn to do Model has the safety of anti-undistinguishable chosen-plain attact.The embodiment of the present invention make use of dual system encipherment scheme to construct This model.Wherein, so-called dual system, refer to that ciphertext and key have two kinds of forms: common form and half functional form.Common shape The key of formula is for the decrypting process of the present invention;Half functional form key is then for proving the safety of model.Meanwhile, the present invention The dual system encipherment scheme that embodiment is utilized meets that 1 bit is monolateral opens the system requirement for ciphertext, i.e. for 0 ratio in plain text Special encrypted cipher text has a specific structure, this structure can be measured by key and inspecting identity but can not the person of being hacked detect Go out, be then a random number and can be by inverse sampling for the encrypted cipher text of in plain text 1 bit.Detailed process is carried out below in detail Thin description.
In step s 102, have the 1 monolateral opening function of bit by proof, the undistinguishable model of level identity base has There is the safety of undistinguishable chosen-plain attact to prove that the security model of the level identity based system of attack is opened in anti-selection Safety.
It should be noted that the safety of the scheme of the embodiment of the present invention can be divided into two levels to be illustrated.One be by There is anti-selection open attack model, many bits level identity base scheme safety reduction and monolateral public open merit for having Can, anti-undistinguishable chosen-plain attact model, the safety of 1 bit level identity base scheme;Two is to construct one Have and monolateral public open attribute, 1 bit level identity base scheme, the number that the safety reduction of this structure is assumed in general group Learn difficult problem, and proved.
Further, in one embodiment of the invention, as it is shown on figure 3, structure have the 1 monolateral opening function of bit, The undistinguishable model of level identity base, farther includes:
Step S301, system foundation: according to closing number rank Bilinear GroupsExponent number built by system with the random number chosen Vertical algorithm generates main private key and PKI.
Specifically, (PK, MSK) ← Setup (λ): system sets up algorithm.Close number rank Bilinear GroupsExponent number be N (N= p1p2p3p4),Choose random number u11,u12,...,u1l,u4,x1,x4, ω4←ZN, and calculateAnd U1j,4←U1jU4、W1,4← g1W4、X14←X1X4.Ultimately generate main private key MSK={g1,U11,U12,...,U1l,X1,g3And PKI PK={N, U11,4, U12,4,...,U1l,4,X14,W14,g4}。
Step S302, private key generates: generated the private key of the first level by private key generating algorithm according to the random number chosen.
Alternatively, in one embodiment of the invention, private key generating algorithm can be KeyGen algorithm.
Specifically,Private key generating algorithm.Wherein This algorithms selection random number r, r3,r′3,rj+1,...,rl←ZN, calculate private key
K 1 = g 1 r g 3 r 3 , K 2 = ( U 11 id 1 ... U 1 j id j X 1 ) r g 3 r 3 ′ , E j + 1 = U 1 , j + 1 r g 3 r j + 1 , ... , E l = U 1 l r g 3 r l .
Step S303, private key escrow: according to the private key of last layer node, the atom identity of current hierarchy node and choose 3rd random number obtains the private key of current level by private key escrow algorithm.
Further, in one embodiment of the invention, the private key of the current level generated by private key escrow algorithm Form keeps consistent with the private key form of the first level generated by private key generating algorithm.
Specifically,Private key escrow algorithm.WhereinFor last layer node Private key, ID is the atom identity of current hierarchy node.Choose random numberPrivate key escrow algorithm is such as Under:
K 1 = K 1 ′ g 1 r ′ g 3 r ~ 3 = g 1 r + r ′ g 3 r 3 + r ~ 3 ,
K 2 = K 2 ′ ( U 11 id 1 ... U 1 j id j X 1 ) r ′ ( E j + 1 ′ ) id j + 1 U 1 , j + 1 r ′ id j + 1 g 3 r ~ 3 ′ = = ( U 11 id 1 ... U 1 , j + 1 id j + 1 X 1 ) r + r ′ g 3 r 3 ′ + r ~ 3 ′ + r j + 1 id j + 1 ,
E j + 2 = E j + 2 ′ U 1 , j + 2 r ′ g 3 r j + 2 ′ = U 1 , j + 2 r + r ′ g 3 r j + 2 + r j + 2 ′ ,
E l = E l ′ U 1 , l r ′ g 3 r l ′ = U 1 , l r + r ′ g 3 r l + r l ′ .
Visible, private key escrow algorithm generating private key is a process the most randomized, the form of private key and use The private key that KeyGen algorithm generates keeps consistent in form.
Step S304, encryption: by AES to being encrypted, to obtain ciphertext, wherein, by default knot in plain text Digital ratio is encrypted by the ciphertext of structure specially for the plaintext of 0 bit, and by choosing the random number ciphertext as single-bit 1.
Specifically,AES.Encryption for single-bit 0 is to have one specifically The ciphertext of structure, the encryption for single-bit 1 bit is then a random number.
Work as M=0, choose random number s, t4,t′4, calculating ciphertext:
C 1 = ( Π j U 1 j , 4 id j · X 14 ) s g 4 t 4 , C 2 = W 14 s g 4 t 4 ′ ;
Working as M=1, ciphertext is then at Bilinear GroupsOn two elements randomly selecting, it may be assumed that (C1,C2)←SampG
Step S305, deciphering: be decrypted ciphertext by decipherment algorithm, to recover in plain text.
Specifically,Decipherment algorithm.Owing to the encrypted cipher text of 0 bit in plain text is had one Individual specific structure and this structure can be measured with inspecting identity by key, and the encrypted cipher text to 1 bit in plain text is random.Institute It is also classified into two kinds of situations: as e (C with decrypted result1,K1)=e (C2,K2) time, decrypted result is 0 bit;As e (C1,K1)≠e (C2,K2) time, decrypted result is 1 bit.
Further, in one embodiment of the invention, also include: decrypted result is carried out verification of correctness.
For example, verification of correctness: need to verify when decrypted result is 0 bit, when inputting correct ciphertext and private Key, e (C1,K1)=e (C2,K2) itself it is to set up.Proof procedure is as follows:
e ( C 1 , K 1 ) = e ( ( U 11 id 1 ... U 1 j id j · U 41 id j ... U 4 j id j · X 1 X 2 ) s · g 4 t 4 , g 1 r g 3 r 3 ) = e ( g 1 s [ Σ i = 1 j ( u 1 i id i ) + x 1 ] , g 1 r ) · e ( g 1 s [ Σ i = 1 j ( u 1 i id i ) + x 1 ] , g 3 r ) · e ( g 4 s [ Σ i = 1 j ( u 4 i id i ) + x 4 ] + t 4 , g 1 r ) · e ( g 4 s [ Σ i = 1 j ( u 4 i id i ) + x 4 ] + t 4 , g 3 r ) = e ( g 1 s [ Σ i = 1 j ( u 1 i id i ) + x 1 ] , g 1 r ) = e ( g 1 , g 1 ) s r [ Σ i = 1 j ( u 1 i id i ) + x 1 ] ;
e ( C 2 , K 2 ) = ( g 1 s g 4 ω 4 s + t 4 ′ , ( g 1 u 11 id 1 ... g 1 u 1 j id j · g 1 x 1 ) r · g 3 r 3 ′ ) = e ( g 1 s , g 1 r [ Σ i = 1 j ( u 1 i id i ) + x 1 ] ) · e ( g 1 s , g 3 r ) · e ( g 4 ω 4 s + t 4 ′ , g 1 r [ Σ i = 1 j ( u 1 i id i ) + x 1 ] ) · e ( g 4 ω 4 s + t 4 ′ , g 3 r 3 / ) = e ( g 1 s , g 1 r [ Σ i = 1 j ( u 1 i id i ) + x 1 ] ) = e ( g 1 , g 1 ) s r [ Σ i = 1 j ( u 1 i id i ) + x 1 ] .
Visible, when ciphertext form is correct, decipherment algorithm can recover in plain text with correct private key.
The level identity base encipherment scheme of attack is opened in anti-selection according to embodiments of the present invention, and the anti-selection of selection is opened Attack model can successfully manage many-to-one communication pattern in complex network environment, prevents because assailant has stolen a hop link Information so that attacked all links, caused network paralysis, secondly, attack model is opened in anti-selection and effectively applies to layer In secondary identity based encryption system, extremely mate with real-life sight, can be applicable to large-scale there is sophistication levels structure System in, simple easily realize.

Claims (4)

1. the level identity base encipherment scheme of attack is opened in an anti-selection, it is characterised in that comprise the following steps:
The safe mould that the level identity based system of attack is opened in anti-selection is set up by the game between definition opponent and challenger Type, described is defined including to the game between opponent and challenger:
Initial phase: described opponent states challenge identity vector;
System establishment stage: described challenger's call parameters generating algorithm generates common parameter, and is sent by described common parameter To described opponent;
Private key puts question to inquiry: described opponent is to private key corresponding to described challenger's inquiry identity vector, wherein, and described identity vector It can not be the identity vector of statement in described initial phase;
The challenge stage: identity vector, the message vector of efficiently sampling, PKI parameter and the random number that described opponent output is to be challenged To described challenger, described challenger calls AES and generates cyphertext vector and return to described opponent;
Opening stage: described opponent selects a set to send to described challenger, in order to described challenger opens the closeest Literary composition component obtains in plain text and random number, and described challenger randomly chooses a bit, wherein, if bit is 1, then described The information opened is sent to described opponent by challenger, if bit is 0, the most described challenger samples again with by new plaintext Component sends to described opponent;
The conjecture stage: described opponent exports a conjecture result, if described conjecture result is correct, the most described opponent is in gaming Win;
Have the 1 monolateral opening function of bit by proof, the undistinguishable model of level identity base has undistinguishable and selects bright The safety that literary composition is attacked proves that the safety of the security model of the level identity based system of attack is opened in described anti-selection.
The level identity base encipherment scheme of attack is opened in anti-selection the most according to claim 1, it is characterised in that structure institute State and there is the 1 monolateral opening function of bit, the undistinguishable model of level identity base, farther include:
System is set up: according to closing number rank Bilinear GroupsExponent number and the random number chosen set up algorithm by system and generate main private Key and PKI;
Private key generates: generated the private key of the first level by private key generating algorithm according to the random number chosen;
Private key escrow: lead to the 3rd random number chosen according to the private key of last layer node, the atom identity of current hierarchy node Cross private key escrow algorithm and obtain the private key of current level;
Encryption: by AES to being encrypted, to obtain ciphertext, wherein, by the ciphertext of default structure to list in plain text Bit is that the plaintext of 0 bit is encrypted, and by choosing the random number ciphertext as single-bit 1;And
Deciphering: by decipherment algorithm, described ciphertext is decrypted, to recover described plaintext.
The level identity ciphering scheme of attack is opened in anti-selection the most according to claim 2, it is characterised in that also include: Decrypted result is carried out verification of correctness.
The level identity ciphering method of attack is opened in anti-selection the most according to claim 2, it is characterised in that by described The private key form of the current level that private key escrow algorithm generates and the private key of the first level with the generation of described private key generating algorithm Form keeps consistent.
CN201610509858.XA 2016-06-30 2016-06-30 The level identity base encryption method of attack is opened in anti-selection Active CN106130992B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610509858.XA CN106130992B (en) 2016-06-30 2016-06-30 The level identity base encryption method of attack is opened in anti-selection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610509858.XA CN106130992B (en) 2016-06-30 2016-06-30 The level identity base encryption method of attack is opened in anti-selection

Publications (2)

Publication Number Publication Date
CN106130992A true CN106130992A (en) 2016-11-16
CN106130992B CN106130992B (en) 2019-10-22

Family

ID=57467958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610509858.XA Active CN106130992B (en) 2016-06-30 2016-06-30 The level identity base encryption method of attack is opened in anti-selection

Country Status (1)

Country Link
CN (1) CN106130992B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067520A (en) * 2018-07-26 2018-12-21 北京航空航天大学 Voidable broadcast encryption method and system based on level identity
CN109254965A (en) * 2018-08-22 2019-01-22 中国平安人寿保险股份有限公司 Model treatment method and system, storage medium and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459511A (en) * 2007-12-12 2009-06-17 航天信息股份有限公司 Public key encryption method based on identity in hierarchy construction
CN103986574A (en) * 2014-05-16 2014-08-13 北京航空航天大学 Hierarchical identity-based broadcast encryption method
CN104917618A (en) * 2015-06-02 2015-09-16 北京航空航天大学 Authentication key negotiation method based on hierarchy identity basis and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459511A (en) * 2007-12-12 2009-06-17 航天信息股份有限公司 Public key encryption method based on identity in hierarchy construction
CN103986574A (en) * 2014-05-16 2014-08-13 北京航空航天大学 Hierarchical identity-based broadcast encryption method
CN104917618A (en) * 2015-06-02 2015-09-16 北京航空航天大学 Authentication key negotiation method based on hierarchy identity basis and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘胜利: "公钥加密系统的可证明安全——新挑战新方法", 《密码学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067520A (en) * 2018-07-26 2018-12-21 北京航空航天大学 Voidable broadcast encryption method and system based on level identity
CN109067520B (en) * 2018-07-26 2020-06-05 北京航空航天大学 Revocable broadcast encryption method and system based on hierarchical identity
CN109254965A (en) * 2018-08-22 2019-01-22 中国平安人寿保险股份有限公司 Model treatment method and system, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN106130992B (en) 2019-10-22

Similar Documents

Publication Publication Date Title
Bellare et al. RKA security beyond the linear barrier: IBE, encryption and signatures
Bellare et al. NIZKs with an untrusted CRS: security in the face of parameter subversion
Bellare et al. Security of symmetric encryption against mass surveillance
Han et al. Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
Baek et al. On the integration of public key data encryption and public key encryption with keyword search
Abe et al. Tag-KEM/DEM: A new framework for hybrid encryption
Arriaga et al. Trapdoor privacy in asymmetric searchable encryption schemes
Wang et al. Securing messaging services through efficient signcryption with designated equality test
Emura et al. Generic constructions of secure‐channel free searchable encryption with adaptive security
CN105933102A (en) Identity-based and hidden matrix-constructed fully homomorphic encryption method
Fischlin et al. Backdoored hash functions: immunizing HMAC and HKDF
Boneh et al. Hosting services on an untrusted cloud
CN102594570A (en) Key threshold algorithm based on level identity encryption
Castro et al. Efficient certificateless signatures suitable for aggregation
Bhattacharyya et al. Secure message authentication against related-key attack
Nunez et al. A parametric family of attack models for proxy re-encryption
Lee et al. Public key encryption with equality test from generic assumptions in the random oracle model
Boldyreva et al. On the security of OAEP
Boyd et al. One-round key exchange in the standard model
CN106130992B (en) The level identity base encryption method of attack is opened in anti-selection
Kutyłowski et al. Anamorphic signatures: Secrecy from a dictator who only permits authentication!
Guo et al. Provably secure identity-based authenticated key agreement protocols with malicious private key generators
Zhang et al. Tolerating sensitive-leakage with larger plaintext-space and higher leakage-rate in privacy-aware Internet-of-Things
Steinwandt et al. Identity-based non-interactive key distribution with forward security
CN116132012A (en) Trusted privacy data comparison method, storage device and intelligent terminal thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant