Ciphertext-auditable identity-based encryption

被引:0
|
作者
Lin, Changlu [1 ]
Li, Yong [2 ]
Lv, Kewei [3 ]
Chang, Chin-Chen [4 ,5 ]
机构
[1] Fujian Province Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou,350007, China
[2] Key Laboratory of Communication, Information Systems (Beijing Jiaotong University), Beijing Municipal Commission of Education, Beijing,100044, China
[3] State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing,100049, China
[4] Department of Information Engineering and Computer Science, Feng Chia University, Taichung,40724, Taiwan
[5] Department of Computer Science and Information Engineering, Asia University, Taichung,41354, Taiwan
关键词
Public key cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Ciphertext-auditability of public key encryption scheme means that the ciphertext should been verified by any-one whether it was actually created by the public key. It also should satisfy two additional requirements: 1) no adversary can create a valid-looking ciphertext and then it can pass the verification process together with a public key and a plaintext; 2) the plaintext cannot be revealed from ciphertext without the help of the cor- rect private key. This paper, in the first time, proposes an ciphertext-auditable identity-based encryption. Our scheme doesn't need the certificates and the sender can di- rectly encrypt message via using the identity without the progress of public key authentication. Furthermore, the proposed scheme is provably secure under the standard model against the k-resilient ciphertext-auditability.
引用
收藏
页码:23 / 28
相关论文
共 50 条
  • [41] Identity-based encryption and beyond
    Martin, Luther
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 62 - 64
  • [42] Wildcarded Identity-Based Encryption
    Abdalla, Michel
    Birkett, James
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Schuldt, Jacob C. N.
    Smart, Nigel P.
    JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 42 - 82
  • [43] On the Anonymity of Identity-Based Encryption
    Luo, Song
    Hu, Ning
    JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [44] Identity-based Access Control for Digital Content based on Ciphertext-Policy Attribute-Based Encryption
    Huang, Win-Bin
    Su, Wei-Tsung
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 87 - 91
  • [45] On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption
    Wan, Zhong-Mei
    Weng, Jian
    Lai, Xue-Jia
    Liu, Sheng-Li
    Li, Ji-Guo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 243 - 259
  • [46] Identity-Based Authenticated Encryption with Identity Confidentiality
    Zhao, Yunlei
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 633 - 653
  • [47] Anonymous Identity-Based Encryption with Identity Recovery
    Ma, Xuecheng
    Wang, Xin
    Lin, Dongdai
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 360 - 375
  • [48] Identity-based authenticated encryption with identity confidentiality
    Shen, Shiyu
    Wang, Hongbing
    Zhao, Yunlei
    THEORETICAL COMPUTER SCIENCE, 2022, 901 : 1 - 18
  • [49] Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
    Hofheinz, Dennis
    Koch, Jessica
    Striecks, Christoph
    JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [50] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption
    Lu, Yang
    Li, Jiguo
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202