Pairing-based public-key encryption schemes with backward-and-forward security

被引:0
作者
Han, Song [1 ]
Chang, Elizabeth [1 ]
Dillon, Tharam [1 ]
机构
[1] Curtin Univ Technol, Curtin Business Sch, DEBI Inst, Perth, WA 6845, Australia
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2008年 / 23卷 / 01期
关键词
semantic security; public key encryption; bilinear pairings; backward-and-forward security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based cryptosystems utilize some arbitrary strings as the participants' public key in the underlying system. The encryptioner will not need to obtain the decryptioner's certificate. That will simplify the certificate managernent. Therefore, it is still interesting to propose some new identity-based encryption schemes. In this paper, we will propose two new different constructions, i.e. receiptor-oriented encryption schemes. They are both identity-based encryption schemes and also based on pairings. The proposed encryption schemes have a new advantage, i.e. backward-and-forward security. In addition, we provide the security analysis for the proposed schemes.
引用
收藏
页码:3 / 8
页数:6
相关论文
共 50 条
  • [21] Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
    Hofheinz, Dennis
    Jager, Tibor
    Rupp, Andy
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 146 - 168
  • [22] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    COMPUTER JOURNAL, 2017, 60 (08) : 1161 - 1172
  • [23] Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
    Zvika Brakerski
    Gil Segev
    Journal of Cryptology, 2014, 27 : 210 - 247
  • [24] Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
    Brakerski, Zvika
    Segev, Gil
    JOURNAL OF CRYPTOLOGY, 2014, 27 (02) : 210 - 247
  • [25] Multi-recipient Public-Key Encryption from Simulators in Security Proofs
    Hiwatari, Harunaga
    Tanaka, Keisuke
    Asano, Tomoyuki
    Sakumoto, Koichi
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 293 - +
  • [26] New probabilistic public-key encryption based on the RSA cryptosystem
    Roman'kov, Vitalii A.
    GROUPS COMPLEXITY CRYPTOLOGY, 2015, 7 (02) : 153 - 156
  • [27] Permutation polynomials and a new public-key encryption
    Khachatrian, Gurgen
    Kyureghyan, Melsik
    DISCRETE APPLIED MATHEMATICS, 2017, 216 : 622 - 626
  • [28] Public-Key Encryption from Homogeneous CLWE
    Bogdanov, Andrej
    Noval, Miguel Cueto
    Hoffmann, Charlotte
    Rosen, Alon
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 565 - 592
  • [29] An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles
    Lu, Yang
    Li, Jiguo
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 22 - 25
  • [30] Tightly secure signatures and public-key encryption
    Dennis Hofheinz
    Tibor Jager
    Designs, Codes and Cryptography, 2016, 80 : 29 - 61