An Efficient Public-Key Dual-Receiver Encryption Scheme

被引:2
作者
Gao, Chenglong [1 ]
Chen, Kai [1 ]
Wang, Qiang [2 ]
Chen, Zhixian [3 ]
机构
[1] Shanghai Pudong Dev Bank, Informat Technol Dept, Shanghai 200002, Peoples R China
[2] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
[3] Zhejiang Gongshang Univ, Dept Informat Secur, Hangzhou 310018, Peoples R China
关键词
Public-key dual-receiver encryption; CCA security; standard model; IDENTITY-BASED ENCRYPTION;
D O I
10.1109/ACCESS.2022.3144725
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key dual-receiver encryption (PK-DRE) is a kind of particular public-key encryption for enabling two independent recipients to obtain the same plaintext from the same ciphertext. Due to its dual-receiver property, PK-DRE is quite helpful in many scenarios, such as deniable authentication, global key escrow, security puzzle, and even blockchain. In this paper, we revisit the PK-DRE scheme CFZ14 proposed at CT-RSA 2014 and propose a variant. This variant is original from a new security proof which allows us to remove some steps in CFZ14. To the best of our knowledge, the obtained variant is more efficient than the existing PK-DRE schemes in terms of public verifiability and key size.
引用
收藏
页码:10799 / 10805
页数:7
相关论文
共 18 条
[1]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[2]   Chosen-ciphertext security from identity-based encryption [J].
Canetti, R ;
Halevi, S ;
Katz, J .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 :207-222
[3]  
Chen Y., 2021, ASIACRYPT, P514
[4]  
Chow S.S.M., 2014, LECT NOTES COMPUTER, V8366, P85
[5]  
Damgård I, 2008, LECT NOTES COMPUT SC, V4964, P239, DOI 10.1007/978-3-540-79263-5_15
[6]  
De Caro A, 2011, IEEE SYMP COMP COMMU
[7]  
Diament T., 2004, P 11 ACM C COMPUTER, P330, DOI DOI 10.1145/1030083.1030128
[8]  
Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P146
[9]   Making MA-ABE fully accountable: A blockchain-based approach for secure digital right management [J].
Hei, Yiming ;
Liu, Jianwei ;
Feng, Hanwen ;
Li, Dawei ;
Liu, Yizhong ;
Wu, Qianhong .
COMPUTER NETWORKS, 2021, 191
[10]  
Joux A, 2000, LECT NOTES COMPUT SC, V1838, P385