Pairing-based public-key encryption schemes with backward-and-forward security

被引:0
作者
Han, Song [1 ]
Chang, Elizabeth [1 ]
Dillon, Tharam [1 ]
机构
[1] Curtin Univ Technol, Curtin Business Sch, DEBI Inst, Perth, WA 6845, Australia
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2008年 / 23卷 / 01期
关键词
semantic security; public key encryption; bilinear pairings; backward-and-forward security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based cryptosystems utilize some arbitrary strings as the participants' public key in the underlying system. The encryptioner will not need to obtain the decryptioner's certificate. That will simplify the certificate managernent. Therefore, it is still interesting to propose some new identity-based encryption schemes. In this paper, we will propose two new different constructions, i.e. receiptor-oriented encryption schemes. They are both identity-based encryption schemes and also based on pairings. The proposed encryption schemes have a new advantage, i.e. backward-and-forward security. In addition, we provide the security analysis for the proposed schemes.
引用
收藏
页码:3 / 8
页数:6
相关论文
共 50 条
[31]   Tightly secure signatures and public-key encryption [J].
Dennis Hofheinz ;
Tibor Jager .
Designs, Codes and Cryptography, 2016, 80 :29-61
[32]   Tightly Secure Signatures and Public-Key Encryption [J].
Hofheinz, Dennis ;
Jager, Tibor .
ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 :590-607
[33]   Structure-preserving public-key encryption with leakage-resilient CCA security [J].
Lyu, Lin ;
Liu, Shengli ;
Gu, Dawu .
THEORETICAL COMPUTER SCIENCE, 2019, 795 :57-80
[34]   Lattice-based certificateless public-key encryption in the standard model [J].
Reza Sepahi ;
Ron Steinfeld ;
Josef Pieprzyk .
International Journal of Information Security, 2014, 13 :315-333
[35]   Public-key encryption based on Chebyshev polynomials over GF(q) [J].
Lima, J. B. ;
Panario, D. ;
Campello de Souza, R. M. .
INFORMATION PROCESSING LETTERS, 2010, 111 (02) :51-56
[36]   Lattice-based certificateless public-key encryption in the standard model [J].
Sepahi, Reza ;
Steinfeld, Ron ;
Pieprzyk, Josef .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (04) :315-333
[37]   Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing [J].
Qin, Baodong ;
Liu, Shengli .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 :19-36
[38]   A Pairing-Based Certificateless Authenticated Searchable Encryption with MTI Guarantees [J].
Senouci, Mohammed Raouf ;
Senouci, Abdelkader ;
Li, Fagen .
FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 :439-454
[39]   Pairing-Based Onion Routing with Improved Forward Secrecy [J].
Kate, Aniket ;
Zaverucha, Greg M. ;
Goldberg, Ian .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (04)
[40]   Novel Public-Key Encryption with Continuous Leakage Amplification [J].
Qiao, Zirui ;
Yang, Qiliang ;
Zhou, Yanwei ;
Xia, Zhe ;
Zhang, Mingwu .
COMPUTER JOURNAL, 2021, 64 (08) :1163-1177