Forward-Secure Identity-Based Public-Key Encryption without Random Oracles

被引:22
|
作者
Yu, Jia [1 ]
Cheng, Xiangguo [1 ]
Hao, Rong [1 ]
Kong, Fanyu [2 ]
Fan, Jianxi [3 ]
机构
[1] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
[2] Shandong Univ, Inst Network Secur, Jinan 250100, Peoples R China
[3] Soochow Univ, Sch Comp Sci & Technol, Suzhou 215006, Peoples R China
基金
北京市自然科学基金;
关键词
forward security; public-key encryption; key exposure; standard model; SIGNATURE;
D O I
10.3233/FI-2011-562
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In traditional identity-based encryption schemes, security will be entirely lost once secret keys are exposed. However, with more and more use of mobile and unprotected devices, key exposure seems unavoidable. To deal with this problem, we newly propose a forward-secure identity-based public-key encryption scheme. In this primitive, the exposure of the secret key in one period doesn't affect the security of the ciphertext generated in previous periods. Any parameter in our scheme has at most log-squared complexity in terms of the total number of time periods. We also give the semantic security notions of forward-secure identity-based public-key encryption. The proposed scheme is proven semantically secure in the standard model. As far as we are concerned, it is the first forward-secure identity-based public-key encryption scheme without random oracles.
引用
收藏
页码:241 / 256
页数:16
相关论文
共 50 条
  • [41] Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
    Kiltz, Eike
    Galindo, David
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 336 - 347
  • [42] Chosen ciphertext secure public key threshold encryption without random oracles
    Boneh, D
    Boyen, X
    Halevi, S
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 226 - 243
  • [43] Identity-based parallel key-insulated encryption without random oracles: Security notions and construction
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 409 - +
  • [44] Forward-secure identity-based signature with efficient revocation
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (07) : 1390 - 1411
  • [45] Combined schemes for signature and encryption: The public-key and the identity-based setting
    Gonzalez Vasco, Maria Isabel
    Hess, Florian
    Steinwandt, Rainer
    [J]. INFORMATION AND COMPUTATION, 2016, 247 : 1 - 10
  • [46] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 470 - +
  • [47] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, ChangShe
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1253 - 1258
  • [48] Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    [J]. COMPUTER JOURNAL, 2018, 61 (04): : 586 - 600
  • [49] Identity-based Conditional Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Lee, YoungSil
    Lee, HoonJae
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 349 - 353
  • [50] HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpengu
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2010, 21 (06) : 1049 - 1063