An Improved Identity-Based Encryption Scheme without Bilinear Map

被引:3
|
作者
Zheng, Minghui [1 ]
Zhou, Huihua [1 ]
Cui, Guohua [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp Sci, Wuhan 430074, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS | 2009年
关键词
Cryptography; Identity-Based Encryption; MOV reduction; bilinear map;
D O I
10.1109/MINES.2009.171
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
According to the MOV reduction theory, the Identity-Based Encryption (IBE) scheme basing on the bilinear map will lose the high efficiency of elliptic curve. So it is meaningful to build the provably secure Identity-based encryption scheme, but which is without the bilinear map. In this paper, based on this existing result and our new research, an improved IBE scheme will be proposed. But it is different from previous scheme that the new scheme is without symmetric encryption, and at the same time having strong provable security. At last, we will analyze the performance of this new scheme.
引用
收藏
页码:374 / 377
页数:4
相关论文
共 50 条
  • [21] Efficient Selective Identity-Based Encryption Without Random Oracles
    Boneh, Dan
    Boyen, Xavier
    JOURNAL OF CRYPTOLOGY, 2011, 24 (04) : 659 - 693
  • [22] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    ZHU Yan
    WANG Shanbiao
    MA Di
    FENG Rongquan
    Chinese Journal of Electronics, 2014, 23 (04) : 842 - 850
  • [23] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    Zhu Yan
    Wang Shanbiao
    Ma Di
    Feng Rongquan
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 842 - 850
  • [24] Efficient Selective Identity-Based Encryption Without Random Oracles
    Dan Boneh
    Xavier Boyen
    Journal of Cryptology, 2011, 24 : 659 - 693
  • [25] Improved Anonymous Multi-receiver Identity-Based Encryption
    Chien, Hung-Yu
    COMPUTER JOURNAL, 2012, 55 (04) : 439 - 446
  • [26] Chosen ciphertext security from identity-based encryption without Strong condition
    Tan, Chik How
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 292 - 307
  • [27] Wildcarded Identity-Based Encryption
    Abdalla, Michel
    Birkett, James
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Schuldt, Jacob C. N.
    Smart, Nigel P.
    JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 42 - 82
  • [28] An improved efficient identity-based quantum signature scheme
    Yongfei Huang
    Guangxia Xu
    Xiaoling Song
    Quantum Information Processing, 22
  • [29] Idealizing Identity-Based Encryption
    Hofheinz, Dennis
    Matt, Christian
    Maurer, Ueli
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 495 - 520
  • [30] Wildcarded Identity-Based Encryption
    Michel Abdalla
    James Birkett
    Dario Catalano
    Alexander W. Dent
    John Malone-Lee
    Gregory Neven
    Jacob C. N. Schuldt
    Nigel P. Smart
    Journal of Cryptology, 2011, 24 : 42 - 82