Anonymous Identity-Based Key Scheme in Application of Privacy Protection

被引:0
|
作者
Shen, Changjiang [1 ]
Yang, Lan [1 ]
Zhou, Chuansheng [1 ]
机构
[1] Shenyang Normal Univ, Coll Comp Applicat Technol, 253 HuangHe Bei St, Shenyang 110034, Liaoning, Peoples R China
关键词
privacy protection; Identity-Based Encryption; anonymity; ENCAPSULATION; ENCRYPTION;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
With the advancement of cloud computing application and research, there is a lot of data interaction between the users and the cloud computing platforms where exists a threat to the transmission and storage of users' data. Providing an efficient revocation mechanism for identity-based encryption (IBE) is very important since a user's credential (or private key) can be expired or revealed. For the current identity-based encryption program is not anonymous. We construct a new identity-based anonymous encryption scheme (AIBKE) based on the character of bilinear group and the bilinear DH. The new scheme not only solves the problem that the existing scheme can not protect the privacy of the receiver, but also ensures anonymous that both sender and receiver of the signcryption program. The scheme can satisfy both semantic security, unforgeability, and anonymity.
引用
收藏
页码:1529 / 1535
页数:7
相关论文
共 50 条
  • [41] Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
    Li, Jing
    Tang, Xiangyan
    Wei, Zhijun
    Wang, Yu
    Chen, Wenbin
    Tan, Yu-an
    [J]. MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1543 - 1550
  • [42] Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
    Jing Li
    Xiangyan Tang
    Zhijun Wei
    Yu Wang
    Wenbin Chen
    Yu-an Tan
    [J]. Mobile Networks and Applications, 2021, 26 : 1543 - 1550
  • [43] A Secure Anonymous Identity-Based Virtual-Space Agreement Method for Crowds-Based Anonymous Communicate Scheme
    Lin, Kai
    Wang, Kaiyu
    Shang, Jin
    Sun, Qindong
    [J]. IET INFORMATION SECURITY, 2023, 2023
  • [44] Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network
    Tianhan Gao
    Fangting Peng
    Nan Guo
    [J]. EURASIP Journal on Wireless Communications and Networking, 2016
  • [45] Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network
    Gao, Tianhan
    Peng, Fangting
    Guo, Nan
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [46] Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings
    Barapatre, Prateek
    Rangan, Chandrasekaran Pandu
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2013, 2013, 8204 : 130 - 146
  • [47] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [48] A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Li, Yuting
    Cheng, Qingfeng
    Liu, Ximeng
    Li, Xinghua
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 935 - 946
  • [49] Identity-Based Key Management Scheme for Smart Grid over Lattice
    Yu, Wangke
    Wang, Shuhua
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (01): : 74 - 96
  • [50] An identity-based authenticated key agreement scheme for heterogeneous sensor networks
    Fu, Xiaojing
    Zhang, Guoyin
    Ma, Chunguang
    [J]. Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 582 - 586