华南理工大学学报(自然科学版) ›› 2015, Vol. 43 ›› Issue (1): 118-125.doi: 10.3969/j.issn.1000-565X.2015.01.019

• 计算机科学与技术 • 上一篇    下一篇

具源隐藏特性的 IB-PRE 方案分析

郑郁林蔡沂2   

  1.  1. 华南理工大学 计算机科学与工程学院, 广东 广州 510640 ; 2. 华南理工大学广州学院 计算机工程学院, 广东 广州 510800
  • 收稿日期:2014-05-04 修回日期:2014-07-12 出版日期:2015-01-25 发布日期:2014-12-01
  • 通信作者: 郑郁林(1978-),男,博士生,高级工程师,主要从事信息安全研究 . E-mail:gz.zheng.yulin@gmail.com
  • 作者简介:郑郁林(1978-),男,博士生,高级工程师,主要从事信息安全研究 .
  • 基金资助:
    国家自然科学基金资助项目( 61272413 )

Cryptanalysis of an IB-PRE Scheme with Source Hiding Property

Zheng Yu-lin1 Cai Yi2   

  1. 1. School of Computer Science and Engineering , South China University of Technology , Guangzhou 510640 , Guangdong , China ;2. School of Computer Engineering , Guangzhou College of South China University of Technology , Guangzhou 510800 ,Guangdong , China
  • Received:2014-05-04 Revised:2014-07-12 Online:2015-01-25 Published:2014-12-01
  • Contact: 郑郁林(1978-),男,博士生,高级工程师,主要从事信息安全研究 . E-mail:gz.zheng.yulin@gmail.com
  • About author:郑郁林(1978-),男,博士生,高级工程师,主要从事信息安全研究 .
  • Supported by:
    Supported by the National Natural Science Foundation of China ( 61272413 )

摘要: Emura 等提出的基于身份标识的代理重加密( Emura-IB-PRE )方案具有源隐藏特性,且在随机喻示模型下具有抗选择密文攻击安全性 . 文中提出了一种攻破 Emura-IB-PRE方案的选择密文安全性方法,证明了 Emura-IB-PRE 不能抵抗选择密文攻击,进而提出了改进的 E-SH-IB-PRE 方案,并进行了相关安全性证明 . 结果表明,文中提出的方案在随机喻示模型下具有抗选择密文攻击安全性和源隐藏特性,一级密文可公开验证的原则对代理重加密方案的设计具有重要的作用 .

关键词: 代理重加密, 加密算法, 源隐藏特性, 选择密文攻击

Abstract: As Emura-IB-PRE , an identity label-based proxy re-encryption scheme proposed by Emura et al. , is of source hiding property and chosen ciphertext security in random oracle model , a chosen ciphertext security method to attack Emura-IB-PRE scheme is proposed , and Emura-IB-PRE is proved invalid in resisting the chosen ciphertext attack. In order to solve this problem , an improved scheme named E-SH-IB-PRE is presented and the corresponding security proof is given. The results indicate the presented scheme is secure against chosen ciphertext attack with source hiding property in random oracle model , and that the principle , i.e. , the first level ciphertext can be publicly verified by proxy , is important for proxy re-encryption schemes.

Key words: proxy re-encryption, encryption algorithm, source hiding property, chosen ciphertext attack