| 注册
首页|期刊导航|信息安全研究|基于格的访问控制加密技术研究

基于格的访问控制加密技术研究

谭高升 李伟 马静静 王伟忠 邢建华 马明杰

信息安全研究2024,Vol.10Issue(4):318-324,7.
信息安全研究2024,Vol.10Issue(4):318-324,7.DOI:10.12379/j.issn.2096-1057.2024.04.05

基于格的访问控制加密技术研究

Research on the Lattice-based Access Control Encryption Technology

谭高升 1李伟 1马静静 2王伟忠 3邢建华 1马明杰1

作者信息

  • 1. 北京京航计算通讯研究所 北京 100074
  • 2. 军事科学院系统工程研究院 北京 100101
  • 3. 中国工业互联网研究院 北京 100102
  • 折叠

摘要

Abstract

Access Control Encryption is a novel public-key encryption concept.It can not only protect the confidentiality of data,but also realize the control of information direction.The early scheme based on the DDH(decisional Diffie-Hellman)assumption suffers from the ciphertext leakage attack and only satisfies the chosen plaintext attack(CPA)security.For such problems,cryptologists proposed a security definition of the chosen ciphertext attack(CCA)and constructed a CCA security scheme based on Naor-Yung construction strategy.However,cryptologists have not fixed the security flaw of the DDH scheme,and their CCA scheme has shortcomings such as the low efficiency,complex construction and limited communication strategy.In this paper,the DDH scheme is designed generically,and the flaw of the DDH scheme subjected to the ciphertext leakage attack is remedied in an efficient way.Furthermore,a CCA secure access control encryption scheme is constructed,which is efficient,simple in design and based on the standard difficulty assumption.Finally,based on the lattice difficulty assumption and the decisional bilinear Diffie-Hellman(DBDH)assumption respectively,two kinds of CCA security schemes are instantiated.

关键词

访问控制加密/CCA安全性/高效//标准假设

Key words

access control encryption/CCA security/efficient/lattice/standard assumption

分类

信息技术与安全科学

引用本文复制引用

谭高升,李伟,马静静,王伟忠,邢建华,马明杰..基于格的访问控制加密技术研究[J].信息安全研究,2024,10(4):318-324,7.

基金项目

工业和信息化部2021年产业技术基础公共服务平台项目(2021-H026-1-1) (2021-H026-1-1)

信息安全研究

OA北大核心CSTPCD

2096-1057

访问量0
|
下载量0
段落导航相关论文