Pairing-based public-key encryption schemes with backward-and-forward security

被引:0
作者
Han, Song [1 ]
Chang, Elizabeth [1 ]
Dillon, Tharam [1 ]
机构
[1] Curtin Univ Technol, Curtin Business Sch, DEBI Inst, Perth, WA 6845, Australia
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2008年 / 23卷 / 01期
关键词
semantic security; public key encryption; bilinear pairings; backward-and-forward security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based cryptosystems utilize some arbitrary strings as the participants' public key in the underlying system. The encryptioner will not need to obtain the decryptioner's certificate. That will simplify the certificate managernent. Therefore, it is still interesting to propose some new identity-based encryption schemes. In this paper, we will propose two new different constructions, i.e. receiptor-oriented encryption schemes. They are both identity-based encryption schemes and also based on pairings. The proposed encryption schemes have a new advantage, i.e. backward-and-forward security. In addition, we provide the security analysis for the proposed schemes.
引用
收藏
页码:3 / 8
页数:6
相关论文
共 50 条
[41]   Novel Public-Key Encryption with Continuous Leakage Amplification [J].
Qiao, Zirui ;
Yang, Qiliang ;
Zhou, Yanwei ;
Xia, Zhe ;
Zhang, Mingwu .
COMPUTER JOURNAL, 2021, 64 (08) :1163-1177
[42]   Post-challenge leakage in public-key encryption [J].
Zhang, Zongyang ;
Chow, Sherman S. M. ;
Cao, Zhenfu .
THEORETICAL COMPUTER SCIENCE, 2015, 572 :25-49
[43]   Methods for Restricting Message Space in Public-Key Encryption [J].
Sakai, Yusuke ;
Emura, Keita ;
Hanaoka, Goichiro ;
Kawai, Yutaka ;
Omote, Kazumasa .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) :1156-1168
[44]   Combining Public-Key Encryption with Digital Signature Scheme [J].
Alia, Mohammad Ahmad .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2016, 2017, 533 :870-878
[45]   Certificateless public key encryption: A new generic construction and two pairing-free schemes [J].
Yang, Guomin ;
Tan, Chik How .
THEORETICAL COMPUTER SCIENCE, 2011, 412 (8-10) :662-674
[46]   Public-Key Encryption Resilient to Linear Related-Key Attacks [J].
Cui, Hui ;
Mu, Yi ;
Au, Man Ho .
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 :182-196
[47]   Efficient CCA-secure public-key encryption schemes from RSA-related assumptions [J].
Brown, Jaimee ;
Nieto, Juan Manuel Gonzalez ;
Boyd, Colin .
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 :176-+
[48]   Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack [J].
Cramer, R ;
Shoup, V .
SIAM JOURNAL ON COMPUTING, 2003, 33 (01) :167-226
[49]   Public-key encryption from ID-based encryption without one-time signature [J].
Tan, Chik How .
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 :450-459
[50]   Secure public-key encryption scheme without random oracles [J].
Tan, Chik How .
INFORMATION SCIENCES, 2008, 178 (17) :3435-3442