Ciphertext-auditable identity-based encryption

被引:0
|
作者
Lin, Changlu [1 ]
Li, Yong [2 ]
Lv, Kewei [3 ]
Chang, Chin-Chen [4 ,5 ]
机构
[1] Fujian Province Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou,350007, China
[2] Key Laboratory of Communication, Information Systems (Beijing Jiaotong University), Beijing Municipal Commission of Education, Beijing,100044, China
[3] State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing,100049, China
[4] Department of Information Engineering and Computer Science, Feng Chia University, Taichung,40724, Taiwan
[5] Department of Computer Science and Information Engineering, Asia University, Taichung,41354, Taiwan
关键词
Public key cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Ciphertext-auditability of public key encryption scheme means that the ciphertext should been verified by any-one whether it was actually created by the public key. It also should satisfy two additional requirements: 1) no adversary can create a valid-looking ciphertext and then it can pass the verification process together with a public key and a plaintext; 2) the plaintext cannot be revealed from ciphertext without the help of the cor- rect private key. This paper, in the first time, proposes an ciphertext-auditable identity-based encryption. Our scheme doesn't need the certificates and the sender can di- rectly encrypt message via using the identity without the progress of public key authentication. Furthermore, the proposed scheme is provably secure under the standard model against the k-resilient ciphertext-auditability.
引用
收藏
页码:23 / 28
相关论文
共 50 条
  • [21] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Li, Yan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 35 - 50
  • [22] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Weiran Liu
    Jianwei Liu
    Qianhong Wu
    Bo Qin
    Yan Li
    International Journal of Information Security, 2016, 15 : 35 - 50
  • [23] Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext
    Kim, Jongkil
    Susilo, Willy
    Au, Man Ho
    Seberry, Jennifer
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 679 - 693
  • [24] Chosen ciphertext security from identity-based encryption without Strong condition
    Tan, Chik How
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 292 - 307
  • [25] Efficient dynamic threshold identity-based encryption with constant-size ciphertext
    Susilo, Willy
    Guo, Fuchun
    Mu, Yi
    THEORETICAL COMPUTER SCIENCE, 2016, 609 : 49 - 59
  • [26] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [27] Provably Secure Anonymous Multi-Receiver Identity-Based Encryption with Shorter Ciphertext
    Wang, Huaqun
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 85 - 90
  • [28] An efficient revocable identity-based encryption with ciphertext evolution in the cloud-assisted system
    Chen, Zhiwei
    Deng, Lunzhi
    Ruan, Yu
    Feng, Shuai
    Wang, Tao
    Wang, Bo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (22):
  • [29] Direct Chosen-Ciphertext-Attack hierarchical computing technique for identity-based encryption
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    ICIC Express Letters, 2013, 7 (02): : 571 - 576
  • [30] Efficient chosen ciphertext secure identity-based encryption against key leakage attacks
    Sun, Shi-Feng
    Gu, Dawu
    Liu, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1417 - 1434