• <noscript id="y4y0w"><source id="y4y0w"></source></noscript>
    <table id="y4y0w"><option id="y4y0w"></option></table>
  • <li id="y4y0w"></li>
    <noscript id="y4y0w"></noscript>
    <noscript id="y4y0w"><kbd id="y4y0w"></kbd></noscript>
    <noscript id="y4y0w"><source id="y4y0w"></source></noscript>
    <menu id="y4y0w"></menu>
    <table id="y4y0w"><rt id="y4y0w"></rt></table>
  • 基于格的可證明安全無用戶私鑰加密方案

    Provably secure private-keyless encryption on ideal lattices

    • 摘要: 針對公鑰加密方案涉及繁瑣私鑰管理問題,無用戶私鑰加密通過將傳統用戶私鑰替代為一次性解密憑證,從而簡化了私鑰更新、撤銷等相關復雜管理操作,避免了用戶安全存儲私鑰的代價,成為該問題的有效解決方案之一. 據此,本文提出了一種理想格下的無用戶私鑰加密概念、方案及其安全性要求. 首先,給出了無用戶私鑰加密的形式化定義和可驗證的憑證構造方法,通過由第三方可信機構驗證用戶身份后頒發一次性解密憑證,從而降低了私鑰存儲代價并簡化了私鑰管理流程,并可支持對用戶訪問數據權限的實時判決. 其次,引入密文刷新機制,由初始密文參數可直接生成當前時刻的刷新密文,建立了同一時刻下憑證與刷新密文的對應關系,僅需刷新部分密文,降低密文刷新計算開銷. 此外,本文給出了無用戶私鑰加密安全性要求,包括選擇時間攻擊下的憑證和刷新密文的不可偽造性、時效性安全以及語義安全,并描述了這些安全性要求的對應關系. 最后,本文利用環上短整數解和帶學習誤差困難問題給出了標準模型下并借助R-SIS諭言機實現了該無用戶私鑰加密方案在理想格下的實例分析. 由安全性分析可知,所提實例滿足憑證和刷新密文的不可偽造性、時效性安全以及語義安全. 時空復雜度分析和性能對比表明,所提PKLE方案可避免用戶存儲私鑰代價以及私鑰的定期更新與撤銷等管理操作,更適配于隱私數據動態訪問判決的場景,同時支持部分密文刷新機制且僅需一次環上乘法操作,減少了密文刷新的計算開銷.

       

      Abstract: Private-keyless encryption (PKLE) addresses the cumbersome challenge of private key management by replacing traditional user private keys with one-time decryption credentials. This approach streamlines complex management processes, such as private key updates and revocations while eliminating the cost and burden of secure key storage for users. Building on this paradigm, this paper introduces the concept, scheme, and security requirements for a PKLE system constructed over ideal lattice. First, we define PKLE and propose a construction method for verifiable credentials. These credentials function as "one-time decryption keys" issued by a trusted third party (the "credential issuance center") only after the user's identity is verified. This model simplifies private key management, reduces storage costs, and enables real-time, dynamic decisions on user data access requirements. Second, we introduce a ciphertext-refreshing mechanism that establishes a temporal correspondence between a credential and ciphertext. This mechanism can generate a refreshed ciphertext for any arbitrary time point directly from the initial ciphertext parameters, requiring only partial refreshment of the ciphertext data. This partial-refresh approach significantly reduces the computational overhead of ciphertext refreshing. We also formulate the necessary security requirements for this PKLE scheme—including unforgeability of credentials and refreshed ciphertexts under chosen-time attacks, timeliness security, and semantic security—and elaborate on their interrelationships. A concrete instantiation of this scheme is then constructed over ideal lattices, leveraging the hardness of the ring-small integer solution (R-SIS) and ring-learning with errors (R-LWE) problems. In this construction, the credential is a short preimage vector sampled from a specified dual lattice using the center's private key and a time-varying parameter. By embedding this parameter into the sampling coset, the credential's validity is strictly confined to its designated time slot. Concurrently, the ciphertext-refreshing mechanism re-encapsulates the initial ciphertext based on the R-LWE problem. This binds the refreshed ciphertext to the same time-varying parameter, ensuring it can only be decrypted by the corresponding time-bound credential. Finally, we provide security proofs in the standard model, using an R-SIS oracle, demonstrating that our instantiation satisfies all required security properties: unforgeability of credentials and refreshed ciphertexts, timeliness, and semantic security. A complexity and performance analysis confirms that the proposed PKLE scheme eliminates user-side key-storage overhead and simplifies key management by eliminating the need for periodic updates or revocations. Therefore, the proposed scheme is highly suitable for scenarios requiring dynamic access control for sensitive data. Moreover, its support for a partial ciphertext refresh, requiring only a single ring multiplication, significantly reduces the computational cost of ciphertext updates.

       

    /

    返回文章
    返回
  • <noscript id="y4y0w"><source id="y4y0w"></source></noscript>
    <table id="y4y0w"><option id="y4y0w"></option></table>
  • <li id="y4y0w"></li>
    <noscript id="y4y0w"></noscript>
    <noscript id="y4y0w"><kbd id="y4y0w"></kbd></noscript>
    <noscript id="y4y0w"><source id="y4y0w"></source></noscript>
    <menu id="y4y0w"></menu>
    <table id="y4y0w"><rt id="y4y0w"></rt></table>
  • 啪啪啪视频