无证书代理重加密体制的研究
发布时间:2018-11-27 20:14
【摘要】:代理重加密由Blaze等人在1998年的欧洲密码年会上提出,它在数字版权保护、加密电子邮件转发和云计算等场合有着广泛的应用,成为密码学近年来的一个热点研究领域。在一个代理重加密方案中,代理者使用由授权人产生的针对被授权人的重加密密钥,可以将原本针对授权人的密文转换为针对被授权人的重加密密文,被授权人只需利用其私钥就可以解密重加密密文。 一些代理重加密方案已经在各种文献中提出,大部分代理重加密方案都是在传统的公钥加密的基础上构建或基于身份标识的加密方案上构建。然而,基于PKI的加密系统存在额外的证书管理工作,而基于身份的加密系统有着固有的密钥托管问题。为解决此问题,Sur等人在2010年提出了无证书代理重加密的模式,并给出了具体的方案。作者对该方案进行了研究,分析了其安全性模型和安全性证明过程,发现该方案达不到声称的安全性。尽管如此,他们的文章仍然具有建设性,因为他们推出了新颖的无证书代理重加密模式,也给我们留下了一个有趣的问题,即如何构造一个在随机谕示模型下选择密文安全的CL-PRE方案。本文重点对无证书代理重加密进行了研究,主要研究内容和创新点归纳如下: 一是提出了一个通用构造方法,可以实现随机谕示模型下选择密文安全的无证书代理重加密方案的构建。本文紧紧抓住无证书加密体制和代理重加密体制的特点,研究相应的攻击手法和对抗方法,围绕如何对抗两者叠加带来的攻击,分析了无证书加密、代理重加密组件及其他密码组件之间的关系,提出了解决方案,实现了通用构造方法。该方法可以由基本的公钥加密和基于身份的加密体制开始,构建一个无证书公钥加密方案,然后添加代理重加密因子,,得到一个随机谕示模型下IND-CCA语义安全的无证书代理重加密方案。该方法可以用于构建具体的加密模式,也能用于检验现有代理重加密方案的安全性。 二是对Sur-CL-PRE方案进行检验,证实该方案达不到声称的IND-CCA安全性,提出了改进方案,并证明了改进方案的IND-CCA安全性。本文提出,该通用构造方法可以用于检验现有的无证书代理重加密方案,有助于发现现存方案的薄弱点,以提出攻击方式,改进现有的方案。通过使用通用构造方法对Sur-CL-PRE方案进行了研究,发现了具体的攻击方法,证明该方案并不达到声称的IND-CCA安全性。接着分析了其安全性模型和安全性证明过程,定位了缺陷,最后对方案进行了改进,并证明了改进方案具有IND-CCA安全性。 三是按照本文提出的通用构造方法,由基本的公钥加密体制和基于身份的加密体制开始,完成一个新的无证书代理重加密方案NewCL-PRE的构建,并分析其有效性和正确性,证明了NewCL-PRE在随机谕示模型下具有IND-CCA语义安全性。同时还分析了该方案的性能和特点。该方案为目前第一个具有选择密文安全性的无证书代理重加密方案。 四是本文在对于代理重加密因子研究的基础上,根据一级密文必须具有公开可验证因子的原则,对于K.Emura等人提出的具有源隐藏特性的代理重加密方案进行分析,发现了存在的问题,提出了一个攻破该方案的选择密文安全性的方法,分析了该方案的缺陷,进行了改进,完成相应的证明。 我们认为,对于代理重加密的构造原则的研究,对于随机谕示模型下选择密文安全的无证书代理重加密方案通用构造方法的研究,都将有助于更好的设计更多的方案。我们期待所提出的通用构造方法能有助于得到更多具有更好特点的无证书代理重加密方案。
[Abstract]:The proxy re-encryption is proposed by Blaze et al. in 1998, which has a wide application in digital copyright protection, encrypted e-mail forwarding and cloud computing, and has become a hot research field in recent years. in a proxy re-encryption scheme, the agent uses the re-encryption key for the authorized person generated by the authorized person, and can convert the cipher text originally aiming at the authorized person into the re-encrypted cipher text for the authorized person, and the authorized person can decrypt the re-encrypted cipher text only by using the private key of the authorized person. some proxy re-encryption schemes have been proposed in various documents, and most of the proxy re-encryption schemes are constructed on a traditional public key encryption or on an identity-based encryption scheme However, the PKI-based encryption system has additional certificate management, and the identity-based encryption system has inherent key escrow. In order to solve this problem, Sur et al. proposed a mode of re-encryption of the non-certificate agent in 2010, and given the specific party The author studied the scheme, analyzed its security model and the security certificate process, and found that the scheme could not reach the claimed safety. Sex. Despite this, their articles are still constructive because they have introduced a novel, non-certificate-free, re-encryption model that also leaves us an interesting question, how to construct a CL-PRE that is safe for the selection of the ciphertext under the random access model This paper focuses on the research of the re-encryption of the non-certificate agent, and the main research contents and the innovation points are summarized as follows: next, a general construction method is proposed, which can implement the non-certificate proxy re-encryption scheme of the cipher text security under the random access control model. In this paper, the characteristics of the non-certificate encryption system and the proxy re-encryption system are grasped, the corresponding attack methods and the countermeasures are studied, and the attack caused by the superposition of the two is analyzed, and the non-certificate encryption, the proxy re-encryption component and other cryptographic components are analyzed. In this paper, the solution is put forward, and the general structure is realized. the method can be started by the basic public key encryption and the identity-based encryption system, a certificate-free public key encryption scheme is constructed, the proxy re-encryption factor is added, and a certificate-free agent re-encryption of the IND-CCA semantic security under a random public key model is obtained, the method can be used for constructing a specific encryption mode and also can be used for checking the existing proxy re-encryption scheme, Safety. Two are to be tested for the Sur-CL-PRE protocol, confirming that the protocol does not reach the claimed IND-CCA safety, and proposes an improved protocol and demonstrates the IND-C of the improved protocol CA Security. This paper proposes that the general construction method can be used to check the existing non-certificate proxy re-encryption scheme, which can help to find the weak points of the existing scheme, so as to propose the attack mode and improve the scheme. By using the general construction method to study the Sur-CL-PRE scheme, a specific method of attack is found to prove that the scheme does not reach the claimed IND-C The security model and the security certification process are then analyzed, the defects are located, the scheme is improved, and the improvement scheme is proved to have the IND-C CA security. Three is the general construction method proposed in this paper, which is based on the basic public key encryption system and the identity-based encryption system to complete the construction of a new non-certificate proxy re-encryption scheme, NewCL-PRE, and analyze it The validity and correctness of the new CL-PRE are proved to be IND-C in the random parametric model. CA semantic security. The party is also analyzed The performance and characteristics of the case. The scheme is the first non-certificate with the choice of the safety of the cipher text. Proxy re-encryption scheme. On the basis of the research of the agent re-encryption factors, the paper analyzes the agent re-encryption scheme with the source hiding property proposed by K. Emura et al. In this paper, we find the existing problems, and put forward a method to break the security of the choice cipher text of the scheme, and analyze the defect of the scheme and carry out the reform. In our opinion, for the research of the construction principle of the re-encryption of the proxy, the research on the general construction method of the non-certificate proxy re-encryption scheme for selecting the cipher text safety under the random access model will help. We look forward to the proposed general construction method to help get a lot of better features
【学位授予单位】:华南理工大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TN918.4
本文编号:2361914
[Abstract]:The proxy re-encryption is proposed by Blaze et al. in 1998, which has a wide application in digital copyright protection, encrypted e-mail forwarding and cloud computing, and has become a hot research field in recent years. in a proxy re-encryption scheme, the agent uses the re-encryption key for the authorized person generated by the authorized person, and can convert the cipher text originally aiming at the authorized person into the re-encrypted cipher text for the authorized person, and the authorized person can decrypt the re-encrypted cipher text only by using the private key of the authorized person. some proxy re-encryption schemes have been proposed in various documents, and most of the proxy re-encryption schemes are constructed on a traditional public key encryption or on an identity-based encryption scheme However, the PKI-based encryption system has additional certificate management, and the identity-based encryption system has inherent key escrow. In order to solve this problem, Sur et al. proposed a mode of re-encryption of the non-certificate agent in 2010, and given the specific party The author studied the scheme, analyzed its security model and the security certificate process, and found that the scheme could not reach the claimed safety. Sex. Despite this, their articles are still constructive because they have introduced a novel, non-certificate-free, re-encryption model that also leaves us an interesting question, how to construct a CL-PRE that is safe for the selection of the ciphertext under the random access model This paper focuses on the research of the re-encryption of the non-certificate agent, and the main research contents and the innovation points are summarized as follows: next, a general construction method is proposed, which can implement the non-certificate proxy re-encryption scheme of the cipher text security under the random access control model. In this paper, the characteristics of the non-certificate encryption system and the proxy re-encryption system are grasped, the corresponding attack methods and the countermeasures are studied, and the attack caused by the superposition of the two is analyzed, and the non-certificate encryption, the proxy re-encryption component and other cryptographic components are analyzed. In this paper, the solution is put forward, and the general structure is realized. the method can be started by the basic public key encryption and the identity-based encryption system, a certificate-free public key encryption scheme is constructed, the proxy re-encryption factor is added, and a certificate-free agent re-encryption of the IND-CCA semantic security under a random public key model is obtained, the method can be used for constructing a specific encryption mode and also can be used for checking the existing proxy re-encryption scheme, Safety. Two are to be tested for the Sur-CL-PRE protocol, confirming that the protocol does not reach the claimed IND-CCA safety, and proposes an improved protocol and demonstrates the IND-C of the improved protocol CA Security. This paper proposes that the general construction method can be used to check the existing non-certificate proxy re-encryption scheme, which can help to find the weak points of the existing scheme, so as to propose the attack mode and improve the scheme. By using the general construction method to study the Sur-CL-PRE scheme, a specific method of attack is found to prove that the scheme does not reach the claimed IND-C The security model and the security certification process are then analyzed, the defects are located, the scheme is improved, and the improvement scheme is proved to have the IND-C CA security. Three is the general construction method proposed in this paper, which is based on the basic public key encryption system and the identity-based encryption system to complete the construction of a new non-certificate proxy re-encryption scheme, NewCL-PRE, and analyze it The validity and correctness of the new CL-PRE are proved to be IND-C in the random parametric model. CA semantic security. The party is also analyzed The performance and characteristics of the case. The scheme is the first non-certificate with the choice of the safety of the cipher text. Proxy re-encryption scheme. On the basis of the research of the agent re-encryption factors, the paper analyzes the agent re-encryption scheme with the source hiding property proposed by K. Emura et al. In this paper, we find the existing problems, and put forward a method to break the security of the choice cipher text of the scheme, and analyze the defect of the scheme and carry out the reform. In our opinion, for the research of the construction principle of the re-encryption of the proxy, the research on the general construction method of the non-certificate proxy re-encryption scheme for selecting the cipher text safety under the random access model will help. We look forward to the proposed general construction method to help get a lot of better features
【学位授予单位】:华南理工大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TN918.4
【参考文献】
相关期刊论文 前4条
1 赖俊祚;朱文涛;邓慧杰;刘胜利;寇卫东;;New Constructions for Identity-Based Unidirectional Proxy Re-Encryption[J];Journal of Computer Science & Technology;2010年04期
2 DENG Robert;;CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles[J];Science China(Information Sciences);2010年03期
3 洪澄;张敏;冯登国;;面向云存储的高效动态密文访问控制方法[J];通信学报;2011年07期
4 王会歌;曹浩;刘斌;沈峰;;基于双线性对的代理重加密方案(英文)[J];河北北方学院学报(自然科学版);2012年04期
相关博士学位论文 前1条
1 周德华;代理重加密体制的研究[D];上海交通大学;2013年
本文编号:2361914
本文链接:https://www.wllwen.com/kejilunwen/wltx/2361914.html