Forward-Secure Identity-Based Public-Key Encryption without Random Oracles

被引:22
|
作者
Yu, Jia [1 ]
Cheng, Xiangguo [1 ]
Hao, Rong [1 ]
Kong, Fanyu [2 ]
Fan, Jianxi [3 ]
机构
[1] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
[2] Shandong Univ, Inst Network Secur, Jinan 250100, Peoples R China
[3] Soochow Univ, Sch Comp Sci & Technol, Suzhou 215006, Peoples R China
基金
北京市自然科学基金;
关键词
forward security; public-key encryption; key exposure; standard model; SIGNATURE;
D O I
10.3233/FI-2011-562
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In traditional identity-based encryption schemes, security will be entirely lost once secret keys are exposed. However, with more and more use of mobile and unprotected devices, key exposure seems unavoidable. To deal with this problem, we newly propose a forward-secure identity-based public-key encryption scheme. In this primitive, the exposure of the secret key in one period doesn't affect the security of the ciphertext generated in previous periods. Any parameter in our scheme has at most log-squared complexity in terms of the total number of time periods. We also give the semantic security notions of forward-secure identity-based public-key encryption. The proposed scheme is proven semantically secure in the standard model. As far as we are concerned, it is the first forward-secure identity-based public-key encryption scheme without random oracles.
引用
收藏
页码:241 / 256
页数:16
相关论文
共 50 条
  • [1] New forward-secure public-key encryption without random oracles
    Lu, Yang
    Li, Jiguo
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2013, 90 (12) : 2603 - 2613
  • [2] Forward-Secure Identity-Based Public-Key Encryption without Random Oracles (vol 111, pg 241, 2011)
    Yu, Jia
    Kong, Fanyu
    Cheng, Xiangguo
    Hao, Rong
    Fan, Jianxi
    [J]. FUNDAMENTA INFORMATICAE, 2012, 114 (01) : 103 - 103
  • [3] An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles
    Lu, Yang
    Li, Jiguo
    [J]. THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 22 - 25
  • [4] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    [J]. INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [5] A Forward-Secure Public-Key Encryption Scheme
    Ran Canetti
    Shai Halevi
    Jonathan Katz
    [J]. Journal of Cryptology, 2007, 20 : 265 - 294
  • [6] A forward-secure public-key encryption scheme
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 265 - 294
  • [7] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [8] Forward-secure identity-based encryption scheme
    Yang, Hao-Miao
    Sun, Shi-Xin
    Li, Hong-Wei
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (03): : 534 - 537
  • [9] Forward-Secure Revocable Identity-Based Encryption
    Qin, Baodong
    Bai, Xue
    Zheng, Dong
    Cui, Hui
    Luo, Yiyuan
    [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 321 - 340
  • [10] Forward-secure Public-Key Encryption Scheme with Tamper Evidence
    Jiang Han
    Xu QiuLiang
    Hou MengBo
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 656 - 659