A New ID-based Multi-Recipient Public-key Encryption Scheme

被引:0
作者
Pang Liaojun [1 ,2 ]
Gao Lu [2 ]
Pei Qingqi [2 ]
Gui Jingjing [2 ]
Wang Yumin [2 ]
机构
[1] Xidian Univ, Sch Life Sci & Technol, Xian 710071, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
来源
CHINESE JOURNAL OF ELECTRONICS | 2013年 / 22卷 / 01期
基金
中国国家自然科学基金;
关键词
Multi-recipient public-key encryption; Secure broadcast; ID-based public-key cryptosystem; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Multi-recipient public-key encryption can be used to solve the security issue of One-To-Many communications such as secure broadcast. In a multi-recipient public-key encryption scheme, a ciphertext generated by the sender with its private key can be decrypted correctly by each recipient with its own private key. To solve the key negotiation problem between the sender and each recipient, the ID-based multi-recipient encryption has been proposed recently. Baek at al. proposed a general method to design an ID-based multi-recipient public-key encryption scheme with the IND-CCA2 security by using REACT, and at the same time, they proposed an excellent scheme. However, analyses show that there are still some flaws in their scheme, such as exposing recipient identity and unfair encryption. Motivated by these concerns, we propose a new ID-based multi-recipient public-key encryption scheme based on the same design method. Analyses show that our proposal can overcome all the flaws in Baek at al.'s scheme and is more practical in applications.
引用
收藏
页码:89 / 92
页数:4
相关论文
共 11 条
[1]  
Baek J, 2005, LECT NOTES COMPUT SC, V3386, P380
[2]  
Baudron O, 2000, LECT NOTES COMPUT SC, V1853, P499
[3]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P259
[4]  
Cheng HB, 2012, CHINESE J ELECTRON, V21, P254
[5]   Anonymous Multireceiver Identity-Based Encryption [J].
Fan, Chun-I ;
Huang, Ling-Ying ;
Ho, Pei-Hsiu .
IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (09) :1239-1249
[6]   Multi-recipient public key encryption scheme based on Weil Pairing [J].
Lu, Li ;
Hu, Lei .
Ruan Jian Xue Bao/Journal of Software, 2008, 19 (08) :2159-2166
[7]  
Okamoto T, 2001, LECT NOTES COMPUT SC, V2020, P159
[8]   Improved multicast key management of Chinese wireless local area network security standard [J].
Pang, L. ;
Li, H. ;
Pei, Q. .
IET COMMUNICATIONS, 2012, 6 (09) :1126-1130
[9]  
Pang Liao-Jun, 2009, Journal of Software, V20, P2907, DOI 10.3724/SP.J.1001.2009.03552
[10]   Identity-based multi-receiver threshold signcryption scheme [J].
Qin, Huawang ;
Dai, Yuewei ;
Wang, Zhiquan .
SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (11) :1331-1337