咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Key continual-leakage resilien... 收藏

Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks

Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks

作     者:Mingwu ZHANG Yi MU 

作者机构:School of Computer Sciences Hubei University of Technology Wuhan 430068 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China School of Computer Science and Software Engineering University of Wollongong Wollongong NSW 2522 Australia 

出 版 物:《Frontiers of Computer Science》 (中国计算机科学前沿(英文版))

年 卷 期:2014年第8卷第3期

页      面:456-468页

核心收录:

学科分类:0839[工学-网络空间安全] 08[工学] 0835[工学-软件工程] 081201[工学-计算机系统结构] 081202[工学-计算机软件与理论] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:Acknowledgements The work was supported by the National Natural Science Foundation of China (Grant No. 61370224)  the Key Program of Natural Science Foundation of Hubei Province (2013CFA046)  and the Open Fund Program for State Key Laboratory of Information Security of China 

主  题:broadcast encryption leakage resilience dual system encryption leakage fraction 

摘      要:In order to tolerate possible leakage of secret keys, leakage-resilient cryptosystem models a class of attractive leakage output by allowing an adversary to provide any computable leakage function and learning the partial keys or other possible intemal states from the output of function. In this work, we present an adaptively secure broadcast encryption resilient to key continual leakage in the standard model. Our scheme provides the tolerance of continual leakage, in which any user can generate multiple private keys per user by periodically updating the key. We use the dual system encryption mechanism to implement the leakage resilience and adaptive security, and intrinsically set an algorithm to refresh a key and produce a same distributed new key. We also give the evaluation of the leakage bound and leakage fraction, and the simulations show that our scheme can tolerate about 71% leakage fraction with 3.34× 10^-52 failure probability in standard 80-bit security level when we adjust the leakage factor to allow the private key to be 100 Kb.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分