作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2012, Vol. 38 ›› Issue (10): 120-122. doi: 10.3969/j.issn.1000-3428.2012.10.036

• 安全技术 • 上一篇    下一篇

一种基于身份和密钥封装机制的加密方案

张 永 1,史宝明 1,2,贺元香 1,2   

  1. (1. 兰州理工大学计算机与通信学院,兰州 730050;2. 甘肃联合大学电子与信息工程学院,兰州 730000)
  • 收稿日期:2011-07-27 出版日期:2012-05-20 发布日期:2012-05-20
  • 作者简介:张 永(1963-),男,教授,主研方向:信息安全,数字图像处理;史宝明、贺元香,讲师、硕士研究生
  • 基金资助:
    甘肃省自然科学基金资助项目(0809RJZA015)

Encryption Scheme Based on Identity and Key Encapsulation Mechanism

ZHANG Yong 1, SHI Bao-ming 1,2, HE Yuan-xiang 1,2   

  1. (1. College of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China; 2. College of Electronics and Information Engineering, Gansu Lianhe University, Lanzhou 730000, China)
  • Received:2011-07-27 Online:2012-05-20 Published:2012-05-20

摘要: 提出一个基于身份和密钥封装机制的加密方案,采用对称加密技术实现信息的高效加密解密,利用基于身份的密码算法传递对称密钥。该方案扩展了标准模型下可证明安全的选择密文攻击的加密方案,其安全性规约为判定性Diffie-Hellman假设。分析结果表明,该方案对抵抗自适应选择密文攻击是不可区分的。

关键词: 基于身份的加密, 标准模型, 密钥封装机制, 双线性对, DDH问题, 选择密文攻击

Abstract: This paper proposes a new Identity-based and Key Encapsulation Mechanism(IB-KEM) encryption scheme. The symmetric encryption scheme is used to encryption and description for message, and the identity-based encryption scheme is used to manage the symmetric encryption key. The new scheme is a natural extension of the encryption scheme which is provably secure under chosen ciphertext attack in the standard model. The security of the new scheme is under Decisional Diffie-Hellman(DDH) assumption. The security analysis shows that the new scheme is indistinguishable under adaptive chosen ciphertext attack.

Key words: identity-based encryption, standard model, key encapsulation mechanism, bilinear pairing, DDH problem, chosen ciphertext attack

中图分类号: