公钥广播加密研究综述  

A survey on public-key broadcast encryption

在线阅读下载全文

作  者:崔岩 黄欣沂 赖建昌 宁建廷 CUI Yan;HUANG Xin-yi;LAI Jian-chang;NING Jian-ting(College of Computer and Cyber Security,Fujian Normal University,Fuzhou 350117,China;The Hong Kong University of Science and Technology,Guangzhou 511400,China;School of Cyber Science and Engineering,Southeast University,Nanjing 211189,China)

机构地区:[1]福建师范大学计算机与网络空间安全学院,福建福州350117 [2]香港科技大学(广州),广东广州511400 [3]东南大学网络空间安全学院,江苏南京211189

出  处:《广州大学学报(自然科学版)》2022年第4期53-67,共15页Journal of Guangzhou University:Natural Science Edition

基  金:国家自然科学基金资助项目(62032005,U21A20466,61902191,61972094);福建省自然科学基金资助项目(2020J02016);福建省科协第二届青年人才托举工程资助项目。

摘  要:近年来,随着网络带宽的不断增加,大数据、云计算、外包计算等新兴应用得到飞速发展,同时也带来了更多的安全挑战,传统的点对点安全传输已无法满足错综复杂的网络环境,一对多安全传输变得极为重要。广播加密允许数据拥有者向一组选定的接收者安全分享数据,仅需运行一次加密算法并将密文发布到广播信道,监听此信道的授权用户均可解密获取明文,未授权用户即使合谋也无法正确解密,极大地减少了计算和通信开销。公钥广播加密相比于对称广播加密具有灵活性高、应用范围广等优点,近年来受到广泛关注。文章回顾了公钥广播加密的相关研究历史,从公钥广播加密的应用场景出发,重点介绍了公钥广播加密的系统模型和典型方案,包括标识广播加密、匿名广播加密、叛逆者追踪广播加密和可撤销广播加密,并阐述了各类公钥广播加密的原理和特征。最后,讨论了公钥广播加密的应用场景和未来的研究方向,旨在促进公钥广播加密的研究与发展。Recently, with the increasing of network bandwidth, emerging applications such as big data, cloud computing and outsourcing computing are growing rapidly. At the same time, it brings more security challenges. Traditional point-to-point secure transmission cannot satisfy the requirement of network, and one to many secure transmission has become extremely important. Broadcast encryption allows a data owner to securely share the same data with a group of selected users by running the encryption algorithm once and publishing the ciphertext to a public broadcast channel. All authorized users listening to the channel can decrypt the ciphertext successfully and unauthorized users cannot learn the plaintext even if they collude. Broadcast encryption greatly reduces computational and communication overheads. Compared with symmetric broadcast encryption, public key broadcast encryption has the advantage of flexibility and has received widespread attention in recent years. This paper examines public key broadcast encryption comprehensively. We begin with the application scenarios of public key broadcast encryption and focus on system models and typical schemes including identity-based broadcast encryption, anonymous broadcast encryption, traitor tracing broadcast encryption, and revocable broadcast encryption. We also show how they work and the characteristics of various schemes. Finally, the application scenarios and future research directions are given, which aim to promote the research of public key broadcast encryption.

关 键 词:广播加密 公钥密码 标识密码 匿名性 可追踪性 可撤销性 

分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象