• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学

• 论文 • 上一篇    下一篇

一种分级代理的受限伪随机函数构造方案

张丽娜1,2,周彦伟2,侯红霞2,3   

  1. (1.西安科技大学计算机科学与技术学院,陕西 西安 710054;2.陕西师范大学计算机科学学院,陕西 西安 710062;
    3.西安邮电大学通信与信息工程学院,陕西 西安 710121 )
  • 收稿日期:2016-03-02 修回日期:2016-07-01 出版日期:2017-10-25 发布日期:2017-10-25
  • 基金资助:

    国家自然科学基金(61272436,61572303);榆林市科技计划产学研项目(2014CXY-08-01);陕西省自然科学基金青年项目(2017JQ6026)

A constrained pseudo-random function
construction  scheme based on hierarchical proxy

ZHANG Li-na1,2,ZHOU Yan-wei2,HOU Hong-xia2,3   

  1. (1.School of Computing Science and Technology,Xi’an University of Science and Technology,Xi’an  710054;
    2.School of Computer Science,Shaanxi Normal University,Xi’an 710062;
    3.School of Communication and Information Engineering,Xi’an University of Posts & Telecommunications,Xi’an 710121,China)
  • Received:2016-03-02 Revised:2016-07-01 Online:2017-10-25 Published:2017-10-25

摘要:

受限伪随机函数的概念于2013年分别是由Boneh和Waters、Kiayiaset 等以及Boyle 等提出的,是指由主密钥k可以派生出一个受限密钥ks,在定义域的受限集合S上利用主密钥k和该受限密钥均可计算出相同的伪随机函数(PRF)的值。基于Boneh和Waters方案中展示的基于比特固定结构的受限伪随机函数方案,给出了基于分级代理的受限伪随机函数的构造方案,该方案的受限集合大小不受分级层数的影响,在标准模型下基于多线性判定性Diffie-Hellman假设(MDDH)证明了其安全性。本方案在实际环境中可用于分级或代理下广播加密的加密密钥或者非交互式环境中协商的会话密钥。

关键词: 受限伪随机函数, 多线性映射, 分级代理, 标准模型

Abstract:

The concept of constrained pseudo-random functions (CPRF) was proposed independently by Boneh and Waters, Boyle etc., Kiayias etc. in 2013. In a CPRF a constrained key  ks can be derived from the master key  k. Both  ks and   k can be used to calculate the same pseudo-random function (PRF) value. Based on the CPRF with bit-fixing structure proposed by Boneh and Waters, we propose a construction of hierarchical proxy based on constrained pseudorandom functions. The size of the constrained set cannot be influenced by the layer number of the hierarchical proxy. The proposed scheme is proved to be secure in the standard model under the multilinear decisional Diffie-Hellman assumption. And it can be used to generate the encryption key of broadcast encryption or the session key of the identity-based non-interactive key exchange under the hierarchical proxy in practice.

Key words: constrained pseudo-random functions(CPRF), multilinear maps, hierarchical proxy, standard model