首站-论文投稿智能助手
典型文献
MSK-PK:A Public-Key Encryption Cryptosys-tem with Multiple Secret-Keys
文献摘要:
By allowing intermediate nodes to com-bine multiple packets before forwarding them,the concept of network coding in multi-cast networks can provide maximum possible information flow.However,this also means traditional encryption methods are less applicable,since the different public-keys of receivers imply different ciphertexts which cannot be easily combined by network coding.While network coding itself may provide confiden-tiality,its effectiveness heavily depends on the underly-ing network topology and ability of the eavesdroppers.Fi-nally,broadcast encryption and group key agreement techniques both allow a sender to broadcast the same ciphertext to all the receivers,although they rely on the assumptions of trusted key servers or secure channels.In this paper,we propose a novel public-key encryption concept with a single public-key for encryption and mul-tiple secret keys for decryption(MSK-PK),which has limited ciphertext expansion and does not require trusted key servers or secure channels.To demonstrate the feas-ibility of this concept,we construct a concrete scheme based on a class of lattice-based multi-trapdoor functions.We prove that those functions satisfy the one-wayness property and can resist the nearest plane algorithm.
文献关键词:
作者姓名:
ZHAI Jiaqi;LIU Jian;CHEN Lusheng;WANG Lingyu
作者机构:
School of Mathematical Sciences,Nankai University,Tianjin 300071,China;School of Cybersecurity,College of Intelligence and Computing,Tianjin University,Tianjin 300350,China;CIISE,Concordia University,Montreal,QC H3G 2J1,Canada
引用格式:
[1]ZHAI Jiaqi;LIU Jian;CHEN Lusheng;WANG Lingyu-.MSK-PK:A Public-Key Encryption Cryptosys-tem with Multiple Secret-Keys)[J].电子学报(英文),2022(04):764-772
A类:
Cryptosys,confiden,tiality,feas,wayness
B类:
MSK,PK,Public,Encryption,tem,Multiple,Secret,Keys,By,allowing,intermediate,nodes,multiple,packets,before,forwarding,them,concept,coding,networks,provide,maximum,possible,information,flow,However,this,also,means,traditional,encryption,methods,less,applicable,since,different,public,keys,receivers,imply,ciphertexts,which,cannot,easily,combined,by,While,itself,may,effectiveness,heavily,depends,underly,topology,ability,eavesdroppers,Fi,nally,broadcast,group,agreement,techniques,both,sender,same,although,they,rely,assumptions,trusted,servers,secure,channels,In,paper,propose,novel,single,secret,decryption,has,limited,expansion,does,require,To,demonstrate,ibility,construct,concrete,scheme,class,lattice,trapdoor,functions,We,prove,that,those,satisfy,one,property,resist,nearest,plane,algorithm
AB值:
0.578852
相似文献
Structured Sparse Coding With the Group Log-regularizer for Key Frame Extraction
Zhenni Li;Yujie Li;Benying Tan;Shuxue Ding;Shengli Xie-School of Automation,Guangdong University of Technology,Guangzhou 510006,and also with the Guangdong-Hong Kong-Macao Joint Laboratory for Smart Discrete Manufacturing,Guangdong University of Technology(GDUT),Guangzhou 510006,China;School of Artificial Intelligence,Guilin University of Electronic Technology,Guilin 541004,China,and also with the National Institute of Advanced Industrial Science and Technology,Tsukuba,Ibaraki 305-8560,Japan;School of Artificial Intelligence,Guilin University of Electronic Technology,Guilin 541004,China;Key Laboratory of Intelligent Information Processing and System Integration of IoT(GDUT),Ministry of Education,and with Guangdong Key Laboratory of IoT Information Technology(GDUT),Guangzhou 510006,China
机标中图分类号,由域田数据科技根据网络公开资料自动分析生成,仅供学习研究参考。