计算机应用 ›› 2014, Vol. 34 ›› Issue (4): 1038-1041.DOI: 10.11772/j.issn.1001-9081.2014.04.1038

• 计算机安全 • 上一篇    下一篇

基于身份的条件型广播代理重加密方案

潘峰1,2,葛运龙3,张倩1,2,申军伟1,2   

  1. 1. 网络与信息安全武警部队重点实验室(武警工程大学),西安 710086;
    2. 武警工程大学 网络与信息安全研究所,西安 710086;
    3. 武警警官学院 电子技术系,成都 610213
  • 收稿日期:2013-09-12 修回日期:2013-11-12 出版日期:2014-04-01 发布日期:2014-04-29
  • 通讯作者: 葛运龙
  • 作者简介:潘峰(1967-),男,北京人,副教授,主要研究方向:公钥密码学;
    葛运龙(1989-),男,山东荣成人,硕士研究生,主要研究方向:公钥密码学;
    张倩(1986-),女,陕西西安人,讲师,主要研究方向:公钥密码学;
    申军伟(1984-),男,内蒙古人,讲师,硕士,主要研究方向:网络和信息安全。
  • 基金资助:

    国家自然科学基金资助项目;陕西省自然科学基金资助项目

Identity-based conditional proxy broadcast re-encryption

PAN Feng1,2,GE Yunlong3,ZHANG Qian1,2,SHEN Junwei1,2   

  1. 1. Institute of Network and Information Security, Engineering University of Armed Police Force, Xi'an Shaanxi 710086, China
    2. Key Laboratory of Network and Information Security (Engineering University of Armed Police Force), Xi'an Shaanxi 710086, China
    3. Department of Electronic Technology, Officers College of CAPF, Chengdu Sichuan 610213, China
  • Received:2013-09-12 Revised:2013-11-12 Online:2014-04-01 Published:2014-04-29
  • Contact: GE Yunlong

摘要:

在传统的代理重加密(PRE)体制中,代理者一旦获得重加密密钥就能将所有授权者能解密的密文转换成受理者能解密的密文,代理者的重加密权限过大;而且授权者需要对不同的受理者生成代理重加密密钥,计算过程中浪费了大量的资源。为了解决以上问题,构造了一种基于身份的条件型广播代理重加密方案。该方案中的授权者在生成重加密密钥过程中加入特殊条件,来限制代理者的重加密权限过大的问题;与此同时,使授权者的密文能够被再次广播以确保重要通信,这样的处理能节省更多的计算和通信开销。最后通过理论分析阐明了方案的安全性。

Abstract:

In traditional Proxy Re-Encryption (PRE), a proxy is too powerful as it has the ability to re-encrypt all delegator's ciphertexts to delegatee once the re-encryption key is obtained; And for more than one delegatees, delegator needs to generate different re-encryption key for different delegatee, which wastes a lot of resources in the calculation process. To solve these problems, an identity-based conditional proxy broadcast re-encryption was introduced. The delegator generated a re-encryption key for some specified condition during the encryption, like that the re-encryption authority of the proxy was restricted to that condition only. Moreover, the delegator's ciphertexts could be re-broadcasted to ensure the important communication and save a lot of computation and communication cost. Finally, the theoretical analysis verified the security of the scheme.

中图分类号: