An Improved Identity-Based Encryption Scheme without Bilinear Map

被引:3
|
作者
Zheng, Minghui [1 ]
Zhou, Huihua [1 ]
Cui, Guohua [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp Sci, Wuhan 430074, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS | 2009年
关键词
Cryptography; Identity-Based Encryption; MOV reduction; bilinear map;
D O I
10.1109/MINES.2009.171
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
According to the MOV reduction theory, the Identity-Based Encryption (IBE) scheme basing on the bilinear map will lose the high efficiency of elliptic curve. So it is meaningful to build the provably secure Identity-based encryption scheme, but which is without the bilinear map. In this paper, based on this existing result and our new research, an improved IBE scheme will be proposed. But it is different from previous scheme that the new scheme is without symmetric encryption, and at the same time having strong provable security. At last, we will analyze the performance of this new scheme.
引用
收藏
页码:374 / 377
页数:4
相关论文
共 50 条
  • [41] Mergeable and Revocable Identity-Based Encryption
    Xu, Shengmin
    Yang, Guomin
    Mu, Yi
    Susilo, Willy
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 147 - 167
  • [42] Traceable and retrievable Identity-based Encryption
    Au, Man Ho
    Huang, Qiong
    Liu, Joseph K.
    Susilo, Willy
    Wong, Duncan S.
    Yang, Guomin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 94 - +
  • [43] Anonymous Multireceiver Identity-Based Encryption
    Fan, Chun-I
    Huang, Ling-Ying
    Ho, Pei-Hsiu
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (09) : 1239 - 1249
  • [44] Identity-based Encryption with Efficient Revocation
    Boldyreva, Alexandra
    Goyal, Vipul
    Kumar, Virendra
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 417 - 426
  • [45] Universally composable identity-based encryption
    Nishimaki, Ryo
    Manabe, Yoshifumi
    Okamoto, Tatsuaki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 262 - 271
  • [46] Efficient biometric identity-based encryption
    Li, Xiaoguo
    Xiang, Tao
    Chen, Fei
    Guo, Shangwei
    INFORMATION SCIENCES, 2018, 465 : 248 - 264
  • [47] Universally composable identity-based encryption
    Nishimaki, Roy
    Manabe, Yoshifumi
    Okamoto, Tatsuaki
    PROGRESS IN CRYPTOLOGY - VIETCRYPT 2006, 2006, 4341 : 337 - +
  • [48] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption
    Liu, Yan
    Wu, Xiumei
    Chen, Xuemin
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
  • [49] Lattice-based identity-based resplittable threshold public key encryption scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (02) : 289 - 307
  • [50] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
    Li, Jiguo
    Teng, Meilin
    Zhang, Yichen
    Yu, Qihong
    COMPUTER JOURNAL, 2016, 59 (07) : 1066 - 1075