咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Updatable Identity-Based Hash ... 收藏

Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes

作     者:Qi-Qi Lai Bo Yang Yong Yu Zhe Xia Yan-Wei Zhou Yuan Chen 

作者机构:School of Computer Science Shaanxi Normal University Xi'an 710119 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China School of Computer Science and Technology Wuhan University of Technology Wuhan 430070 China State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710071 China 

出 版 物:《Journal of Computer Science & Technology》 (计算机科学技术学报(英文版))

年 卷 期:2018年第33卷第6期

页      面:1243-1260页

核心收录:

学科分类:12[管理学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 0808[工学-电气工程] 08[工学] 0835[工学-软件工程] 0701[理学-数学] 0811[工学-控制科学与工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:This work was supported by the National Key Research and Development Program of China under Grant No. 2017YFt30802000  the National Natural Science Foundation of China under Grant Nos. 61802241  61772326  61572303  61872229  61802242  and 61602290  the National Natural Science Foundation of China for International Young Scientists under Grant No. 61750110528  the National Cryp-tographv Development Fund during the 13th Five-Year Plan Period of China under Grant Nos. MMJJ20170216 and MMJJ20180217  the Foundation of State Key Laboratory of Information Security of China under Grant No. 2017-MS-03  and the Fundamental Re- search Funds for the Central Universities of China under Grant Nos. GK201603084  GK201702004  GK201603092  GK201603093  and GK201703062 

主  题:public-key encryption identity-based hash proof system lattice updatable leakage-resilience 

摘      要:Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the related master secret keyis widely utilized to construct cryp-paper, we introduce the concept ofand the identity secret key can beupdated securely. Then, we instantiate this primitive based on lattices in the standard model. Moreover, we introduce anapplication of this new primitive by giving a generic construction of leakage-resilient public-key encryption schemes withanonymity. This construction can be considered as the integration of the bounded-retrieval model and the continual leakagemodel. Compared with the existing leakage-resilient schemes, our construction not only is more efficient but also can resistmuch more key leakage.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分