Anonymous Identity-Based Key Scheme in Application of Privacy Protection

被引:0
|
作者
Shen, Changjiang [1 ]
Yang, Lan [1 ]
Zhou, Chuansheng [1 ]
机构
[1] Shenyang Normal Univ, Coll Comp Applicat Technol, 253 HuangHe Bei St, Shenyang 110034, Liaoning, Peoples R China
关键词
privacy protection; Identity-Based Encryption; anonymity; ENCAPSULATION; ENCRYPTION;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
With the advancement of cloud computing application and research, there is a lot of data interaction between the users and the cloud computing platforms where exists a threat to the transmission and storage of users' data. Providing an efficient revocation mechanism for identity-based encryption (IBE) is very important since a user's credential (or private key) can be expired or revealed. For the current identity-based encryption program is not anonymous. We construct a new identity-based anonymous encryption scheme (AIBKE) based on the character of bilinear group and the bilinear DH. The new scheme not only solves the problem that the existing scheme can not protect the privacy of the receiver, but also ensures anonymous that both sender and receiver of the signcryption program. The scheme can satisfy both semantic security, unforgeability, and anonymity.
引用
收藏
页码:1529 / 1535
页数:7
相关论文
共 50 条
  • [1] Privacy Protection in E-commerce: Identity-based Anonymous Privacy Agent
    Guo, Dan
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 143 - 152
  • [2] Separable and anonymous identity-based key issuing
    Sui, AF
    Chow, SSM
    Hui, LCK
    Yiu, SM
    Chow, KP
    Tsang, WW
    Chong, CF
    Pun, KH
    Chan, HW
    [J]. 11th International Conference on Parallel and Distributed Systems Workshops, Vol II, Proceedings,, 2005, : 275 - 279
  • [3] Identity-based data storage scheme with anonymous key generation in fog computing
    Zhang, Jianhong
    Bai, Wenle
    Wang, Xianmin
    [J]. SOFT COMPUTING, 2020, 24 (08) : 5561 - 5571
  • [4] Identity-based data storage scheme with anonymous key generation in fog computing
    Jianhong Zhang
    Wenle Bai
    Xianmin Wang
    [J]. Soft Computing, 2020, 24 : 5561 - 5571
  • [6] Anonymous Key Issuing Protocol for Distributed Sakai-Kasahara Identity-based Scheme
    Siad, Amar
    Amara, Moncef
    [J]. PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), 2011, : 35 - 40
  • [7] An Identity-based One-off Public Key Scheme for Privacy Preservation
    Chai Linpeng
    Zhang Bin
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 199 - 199
  • [8] An identity-based society oriented signature scheme with anonymous signers
    Saeednia, S
    [J]. INFORMATION PROCESSING LETTERS, 2002, 83 (06) : 295 - 299
  • [9] Anonymous identity-based encryption scheme in groups of prime order
    Ren, Yan-Li
    Zhang, Xin-Peng
    Qian, Zhen-Xing
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2013, 36 (05): : 96 - 98
  • [10] An identity-based multiple grade anonymous proxy signature scheme
    Cui, Shenjun
    Wen, Fengtong
    [J]. Journal of Computational Information Systems, 2010, 6 (07): : 2441 - 2447