信息网络安全 ›› 2015, Vol. 15 ›› Issue (10): 32-39.doi: 10.3969/j.issn.1671-1122.2015.10.005

• 技术研究 • 上一篇    下一篇

基于大整数分解的身份加密体制研究

刘锦刚(), 董军武   

  1. 广州大学数学与信息科学学院,广东广州510006
  • 收稿日期:2015-07-03 出版日期:2015-10-01 发布日期:2015-11-04
  • 作者简介:

    作者简介: 刘锦刚(1989-),男,河南,硕士研究生,主要研究方向:公钥密码学;董军武(1971-),男,河南,副教授,博士,主要研究方向:公钥密码学。

  • 基金资助:
    国家自然科学基金[11371106];广州市属高校科技项目[1201420765]

Research on Identity-based Encryptions from Large Integer Factorization

LIU Jin-gang(), DONG Jun-wu   

  1. College of Mathematics & Information Science, Guangzhou University, Guangzhou Guangdong 510006, China
  • Received:2015-07-03 Online:2015-10-01 Published:2015-11-04

摘要:

近年来,基于身份的密码体制研究受到了广泛关注。不同于传统公钥密码体制,基于身份的加密体制(IBE)可直接利用用户的身份标识作为公钥,不需要使用数字证书,密钥管理简单,这使其成为公钥加密领域的一个研究热点。目前,已有的身份加密体制大多是基于椭圆曲线上的双线性对来构造的,然而双线性群上的乘法和指数运算较慢,参数选择过于复杂,导致计算效率较低,这使得基于双线性对构造的身份加密方案难以走向实用。传统公钥密码体制所依赖的标准大整数分解问题计算效率较好,是用于构造安全实用的基于身份的加密体制的另一个方向。文章综述了基于大整数分解的身份加密体制的最新研究进展,概述了基于身份的加密体制的定义和安全模型,总结了基于身份的加密体制的研究现状;对几种典型的基于大整数分解的身份加密算法进行了对比、分析,总结各算法的优劣;对基于身份的加密体制中存在的热点问题进行剖析,并提出有价值的问题供进一步研究。

关键词: 公钥密码体制, 基于身份的加密体制, 大整数分解, 离散对数问题, 整数剩余

Abstract:

Recently, research on identity-based encryption (IBE) has received extensive attentions. Different from the traditional public-key cryptosystem, IBE applies the user’s identity directly as a public key rather than the digital certificate, and the key management is simple, which makes the IBE become a research hotspot in the field of public-key encryption. Nowadays, IBE is often constructed using bilinear pairing on elliptic curve. But the multiplication and exponential operations based on bilinear group are slow and inefficient, and the parameters selection is too complicated. Therefore, the IBE constructed based on bilinear pairing is not practical. The standard large integer factorization of the traditional public-key cryptosystem is better, which is the other direction for the construction of a safe and practical IBE. This paper describes the research progress of the IBE based on large integer factorization, introduces the definition and the security model of the IBE, and summarizes current research achievements on the IBE. This paper also compares and analyzes several typical IBE algorithms based on large integer factorization, and summarizes the advantages and disadvantages of each algorithm. In addition, this paper analyzes the hot issues of IBE, and puts forward some valuable problems for further research.

Key words: public-key cryptosystem, identity-based encryption, large integer factorization, discrete logarithm problem, integer residuosity

中图分类号: