北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2023, Vol. 46 ›› Issue (1): 44-49,83.

• 论文 • 上一篇    下一篇

基于无证书的门限条件代理重加密方案

李兆斌,张璐,赵洪,魏占祯   

  1. 北京电子科技学院
  • 收稿日期:2021-11-26 修回日期:2022-05-12 出版日期:2023-02-28 发布日期:2023-02-22
  • 通讯作者: 张璐 E-mail:bestizhangl@126.com
  • 基金资助:
    教育部产学合作协同育人项目

Certificateless Threshold-Based Conditional Proxy Re-Encryption Scheme

  1. Beijing Electronic Science and Technology Institute
  • Received:2021-11-26 Revised:2022-05-12 Online:2023-02-28 Published:2023-02-22

摘要: 条件代理重加密可以根据条件对密文进行细粒度的授权,现有的方案多数是基于公钥基础设施或身份公钥来实现,存在证书管理和密钥托管问题为了解决这些问题,提出了一种新的无证书门限条件代理重加密方案,在生成原密文和重加密密钥时加入条件信息,代理服务器在重加密前先对条件符合性进行验证,确保只有条件匹配的密文才能被重加密利用门限技术实现对重加密密钥和授权者私钥的保护,同时可以抵御替换用户公钥的第一类敌手和掌握系统主密钥的第二类敌手的攻击仿真结果表明,所提方案在重加密密钥生成与重加密过程中计算效率较高,为分布式云存储等应用中的密文共享提供了基础

关键词: 条件代理重加密 , 无证书 , 门限 , 分布式数据共享

Abstract:

Conditional proxy re-encryption can grant fine-grained authorization to ciphertext according to conditional information. Most of the existing conditional proxy re-encryption schemes are based on traditional public key infrastructure or identity public key, therefore bringing the problems of certificate management and key escrow. To solve these problems, a new certificateless threshold conditional proxy re-encryption scheme is constructed, in which the conditional information is added when the original ciphertext and re-encryption key are generated, and the proxy node verifies the condition compliance before re-encryption to ensure that only the matching ciphertext can be re-encrypted. Threshold technology is used to protect re-encryption key and private key. Theoretical analysis shows that the proposed scheme is able to resist two types of adversary attacks,the first type-I adversary replaces the user's public key and the type-II adversary holds the system's master key.  The simulation results demonstrate that the proposed scheme has high efficiency in key operations such as re-encryption key generation and re-encryption, therefore, providing the basis for ciphertext sharing in applications such as distributed cloud storage.


Key words: conditional proxy re-encryption , certificateless , threshold , distributed data sharing

中图分类号: