Provably Secure Anonymous Multi-Receiver Identity-Based Encryption with Shorter Ciphertext

被引:5
作者
Wang, Huaqun [1 ]
机构
[1] Dalian Ocean Univ, Sch Informat Engn, Dalian, Peoples R China
来源
2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM) | 2014年
关键词
anonymity; multi-receiver; identity-based encryption; provable security;
D O I
10.1109/DASC.2014.24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymous multi-receiver identity-based encryption (ID-MRE) can protect the receiver identity besides message confidentiality. It can be applied in many fields, such as VoIP (Voice over Internet Protocol) and pay-TV systems. Based on the bilinear pairings, this paper proposes an anonymous ID-MRE scheme. The proposed scheme satisfies the indistinguishability of encryptions under selective multi-identity, adaptive chosen ciphertext attacks (IND-sMID-CCA2). On the other hand, it also satisfies the anonymous indistinguishability of encryptions under selective multi-identity, adaptive chosen ciphertext attacks (ANON-sMID-CCA2). The security analysis and performance analysis show that our scheme is provably secure and efficient.
引用
收藏
页码:85 / 90
页数:6
相关论文
共 19 条
[1]   Generalised key delegation for hierarchical identity-based encryption [J].
Abdalla, M. ;
Kiltz, E. ;
Neven, G. .
IET INFORMATION SECURITY, 2008, 2 (03) :67-78
[2]  
[Anonymous], LECT NOTES COMPUTER
[3]  
[Anonymous], IEEE T PARA IN PRESS
[4]  
[Anonymous], 2006, PROC INT C SECUR MAN, DOI DOI 10.1049/IET-PEL.2015.0530
[5]  
Baudron O, 2000, LECT NOTES COMPUT SC, V1853, P499
[6]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P259
[7]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]   Short signatures without random oracles and the SDH assumption in bilinear groups [J].
Boneh, Dan ;
Boyen, Xavier .
JOURNAL OF CRYPTOLOGY, 2008, 21 (02) :149-177
[10]  
Boneh D, 2008, LECT NOTES COMPUT SC, V5350, P455, DOI 10.1007/978-3-540-89255-7_28