Ciphertext-auditable identity-based encryption

被引:0
|
作者
Lin, Changlu [1 ]
Li, Yong [2 ]
Lv, Kewei [3 ]
Chang, Chin-Chen [4 ,5 ]
机构
[1] Fujian Province Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou,350007, China
[2] Key Laboratory of Communication, Information Systems (Beijing Jiaotong University), Beijing Municipal Commission of Education, Beijing,100044, China
[3] State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing,100049, China
[4] Department of Information Engineering and Computer Science, Feng Chia University, Taichung,40724, Taiwan
[5] Department of Computer Science and Information Engineering, Asia University, Taichung,41354, Taiwan
关键词
Public key cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Ciphertext-auditability of public key encryption scheme means that the ciphertext should been verified by any-one whether it was actually created by the public key. It also should satisfy two additional requirements: 1) no adversary can create a valid-looking ciphertext and then it can pass the verification process together with a public key and a plaintext; 2) the plaintext cannot be revealed from ciphertext without the help of the cor- rect private key. This paper, in the first time, proposes an ciphertext-auditable identity-based encryption. Our scheme doesn't need the certificates and the sender can di- rectly encrypt message via using the identity without the progress of public key authentication. Furthermore, the proposed scheme is provably secure under the standard model against the k-resilient ciphertext-auditability.
引用
收藏
页码:23 / 28
相关论文
共 50 条
  • [1] Ciphertext-auditable public key encryption
    Hada, Satoshi
    Sakurai, Kouichi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 308 - 321
  • [2] Chosen Ciphertext Secure Fuzzy Identity-Based Encryption Scheme With Short Ciphertext
    Shi, Wenbo
    Jang, Injoo
    Yoo, Hyeong Seon
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1036 - 1040
  • [3] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
  • [4] Chosen-ciphertext security from identity-based encryption
    Boneh, Dan
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    SIAM JOURNAL ON COMPUTING, 2006, 36 (05) : 1301 - 1328
  • [5] Ciphertext-Auditable Public Key Encryptions without Random Oracles
    Lin, Changlu
    Liu, Chenglian
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (06): : 2599 - 2602
  • [6] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [7] Revocable identity-based encryption with server-aided ciphertext evolution
    Sun, Yinxia
    Mu, Yi
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    THEORETICAL COMPUTER SCIENCE, 2020, 815 : 11 - 24
  • [8] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [9] Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities
    Chiku, Sohto
    Hara, Keisuke
    Shikata, Junji
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 299 - 314
  • [10] Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model
    孙瑾
    胡予濮
    张乐友
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (06) : 672 - 676