An Improved Identity-Based Encryption Scheme without Bilinear Map

被引:3
|
作者
Zheng, Minghui [1 ]
Zhou, Huihua [1 ]
Cui, Guohua [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp Sci, Wuhan 430074, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS | 2009年
关键词
Cryptography; Identity-Based Encryption; MOV reduction; bilinear map;
D O I
10.1109/MINES.2009.171
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
According to the MOV reduction theory, the Identity-Based Encryption (IBE) scheme basing on the bilinear map will lose the high efficiency of elliptic curve. So it is meaningful to build the provably secure Identity-based encryption scheme, but which is without the bilinear map. In this paper, based on this existing result and our new research, an improved IBE scheme will be proposed. But it is different from previous scheme that the new scheme is without symmetric encryption, and at the same time having strong provable security. At last, we will analyze the performance of this new scheme.
引用
收藏
页码:374 / 377
页数:4
相关论文
共 50 条
  • [31] An improved efficient identity-based quantum signature scheme
    Huang, Yongfei
    Xu, Guangxia
    Song, Xiaoling
    QUANTUM INFORMATION PROCESSING, 2022, 22 (01)
  • [32] An Improved Identity-based Society Oriented Signature Scheme
    Tan, Zuowen
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 338 - 341
  • [33] A New Construction of Leakage-Resilient Identity-Based Encryption Scheme
    Qiao, Zirui
    Xu, Ran
    Lu, Yonghui
    Zhou, Yanwei
    Yang, Bo
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 133 - 150
  • [34] An Identity-Based Encryption with Equality Test scheme for healthcare social apps
    Lu, Jingwei
    Li, Hongbo
    Huang, Jianye
    Ma, Sha
    Au, Man Ho Allen
    Huang, Qiong
    COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [35] Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles
    Guo, Yuyan
    Jiang, Mingming
    Wei, Shimin
    Xie, Ming
    Sun, Mei
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 53 - 64
  • [36] Identity-based re-encryption scheme with lightweight re-encryption key generation
    Liu, Liang
    Ye, Jun
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (01) : 41 - 57
  • [37] New Constructions of Identity-based Broadcast Encryption without Random Oracles
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (02): : 428 - 439
  • [38] Identity-based proxy re-encryption without random oracles
    Chu, Cheng-Kang
    Tzeng, Wen-Guey
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 189 - +
  • [39] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption
    Lu, Yang
    Li, Jiguo
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202
  • [40] Complete Robustness in Identity-Based Encryption
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 342 - 349