An Improved Identity-Based Encryption Scheme without Bilinear Map

被引:3
|
作者
Zheng, Minghui [1 ]
Zhou, Huihua [1 ]
Cui, Guohua [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp Sci, Wuhan 430074, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS | 2009年
关键词
Cryptography; Identity-Based Encryption; MOV reduction; bilinear map;
D O I
10.1109/MINES.2009.171
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
According to the MOV reduction theory, the Identity-Based Encryption (IBE) scheme basing on the bilinear map will lose the high efficiency of elliptic curve. So it is meaningful to build the provably secure Identity-based encryption scheme, but which is without the bilinear map. In this paper, based on this existing result and our new research, an improved IBE scheme will be proposed. But it is different from previous scheme that the new scheme is without symmetric encryption, and at the same time having strong provable security. At last, we will analyze the performance of this new scheme.
引用
收藏
页码:374 / 377
页数:4
相关论文
共 50 条
  • [1] A practical identity-based signature scheme from bilinear map
    Wang, Zhu
    Chen, Huiyan
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 704 - +
  • [2] On Anonymization of Cocks' Identity-based Encryption Scheme
    Nica, Anca-Maria
    Tiplea, Ferucio Laurentiu
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2019, 27 (03) : 283 - 298
  • [3] An Identity-Based Encryption Scheme with Compact Ciphertexts
    刘胜利
    郭宝安
    张庆胜
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (01) : 86 - 89
  • [4] Improvement of identity-based encryption scheme and algorithms
    Zheng, Ying
    Bai, Qing-Hai
    Zhao, Lin-Na
    Zhang, Hong-Mei
    Zhang, Yu-Chun
    DESIGN, MANUFACTURING AND MECHATRONICS (ICDMM 2015), 2016, : 482 - 489
  • [5] Identity-based encryption scheme with compact ciphertexts
    Liu S.-L.
    Guo B.-A.
    Zhang Q.-S.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 (1) : 86 - 89
  • [6] Improved Identity-Based Online/Offline Encryption
    Lai, Jianchang
    Mu, Yi
    Guo, Fuchun
    Susilo, Willy
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 160 - 173
  • [7] An Authentication Scheme Using Identity-based Encryption & Blockchain
    Zhou, Beini
    Li, Hui
    Xu, Li
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 561 - 566
  • [8] Identity-based Broadcast Encryption Scheme with Untrusted PKG
    Guo, Shanqing
    Zhang, Chunhua
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1613 - 1618
  • [9] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [10] Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices
    Guo, Fuchun
    Mu, Yi
    Susilo, Willy
    Hsing, Homer
    Wong, Duncan S.
    Varadharajan, Vijay
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (02) : 211 - 220