• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

高效且可证明安全的无配对安全中介基于身份的识别方案。

Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

作者信息

Chin Ji-Jian, Tan Syh-Yuan, Heng Swee-Huay, Phan Raphael C-W

机构信息

Faculty of Engineering, Multimedia University, 63100 Cyberjaya, Selangor, Malaysia.

Faculty of Information Science and Technology, Multimedia University, Jalan Ayer Keroh Lama, 75450 Bukit Beruang, Melaka, Malaysia.

出版信息

ScientificWorldJournal. 2014;2014:170906. doi: 10.1155/2014/170906. Epub 2014 May 26.

DOI:10.1155/2014/170906
PMID:25207333
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC4058247/
Abstract

Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

摘要

安全介导密码学最初由博内等人于2001年提出。安全介导密码学背后的主要动机是能够通过要求安全调解人在任何给定交易中进行合作,即时撤销用户的秘密密钥。随后在2003年,博内等人展示了如何将基于RSA的安全介导加密方案从传统公钥设置转换为基于身份的设置,在此设置下不再需要证书。在这两篇开创性论文之后,其他采用安全介导方法的密码原语开始出现。然而,安全介导的基于身份的识别方案(SM-IBI)直到2013年才由秦等人提出,其方案基于双线性配对构建。在本文中,我们通过提出两种无配对且基于经过充分研究的复杂性假设(RSA和离散对数假设)的方案,改进了SM-IBI方案的效率结果。

相似文献

1
Efficient and provable secure pairing-free security-mediated identity-based identification schemes.高效且可证明安全的无配对安全中介基于身份的识别方案。
ScientificWorldJournal. 2014;2014:170906. doi: 10.1155/2014/170906. Epub 2014 May 26.
2
Twin-Schnorr: a security upgrade for the Schnorr identity-based identification scheme.双施诺尔:施诺尔基于身份的识别方案的安全升级。
ScientificWorldJournal. 2015;2015:237514. doi: 10.1155/2015/237514. Epub 2015 Jan 27.
3
Provably secure identity-based identification and signature schemes from code assumptions.基于代码假设的可证明安全的基于身份的识别与签名方案。
PLoS One. 2017 Aug 15;12(8):e0182894. doi: 10.1371/journal.pone.0182894. eCollection 2017.
4
High efficient key-insulated attribute based encryption scheme without bilinear pairing operations.无双线性配对运算的高效密钥绝缘属性基加密方案。
Springerplus. 2016 Feb 19;5:131. doi: 10.1186/s40064-016-1765-9. eCollection 2016.
5
Revocable identity-based proxy re-signature against signing key exposure.可撤销基于身份的代理重签名方案抵抗签名密钥泄露。
PLoS One. 2018 Mar 26;13(3):e0194783. doi: 10.1371/journal.pone.0194783. eCollection 2018.
6
An efficient and provable secure revocable identity-based encryption scheme.一种高效且可证明安全的基于身份的可撤销加密方案。
PLoS One. 2014 Sep 19;9(9):e106925. doi: 10.1371/journal.pone.0106925. eCollection 2014.
7
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.针对云文件共享中的解密密钥暴露问题,基于格的高效可撤销属性加密。
J Cloud Comput (Heidelb). 2023;12(1):37. doi: 10.1186/s13677-023-00414-w. Epub 2023 Mar 11.
8
Quantum attack-resistent certificateless multi-receiver signcryption scheme.抗量子攻击的无证书多接收者签密方案。
PLoS One. 2013 Jun 5;8(6):e49141. doi: 10.1371/journal.pone.0049141. eCollection 2013.
9
An efficient certificateless blind signature scheme without bilinear pairing.
An Acad Bras Cienc. 2014 Jun;86(2):1003-1011.
10
Report on Pairing-based Cryptography.基于配对密码学的报告。
J Res Natl Inst Stand Technol. 2015 Feb 3;120:11-27. doi: 10.6028/jres.120.002. eCollection 2015.