Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts

被引:10
|
作者
Seo, Jae Hong [1 ,2 ]
Kobayashi, Tetsutaro [3 ]
Ohkubo, Miyako [4 ]
Suzuki, Koutarou [3 ]
机构
[1] Seoul Natl Univ, Dept Math, Seoul 151, South Korea
[2] ISaC RIM, Seoul, South Korea
[3] NTT Corp, NTT Informat Sharing Platform Labs, Musashino, Tokyo 1808585, Japan
[4] Natl Inst Informat & Commun Technol, Koganei, Tokyo 1848795, Japan
关键词
anonymous identity-based encryption; anonymous hierarchical identity-based encryption; public-key encryption with keyword search; RANDOM ORACLES; HIBE; IBE;
D O I
10.1587/transfun.E94.A.45
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an anonymous Hierarchical Identity-Based Encryption (anonymous HIBE) scheme with short ciphertexts. Prior to our work, most anonymous HIBE schemes have long ciphertexts increased according to the hierarchical depth of recipient. The size of the ciphertext in our scheme does not depend on the depth of the hierarchy. Moreover, our scheme achieves the lowest computational cost because during the decryption phase the computational cost of decryption is constant. The security can be proven under reasonable assumptions without using random oracles. Our scheme achieves selective-ID security notion.
引用
收藏
页码:45 / 56
页数:12
相关论文
共 50 条
  • [1] Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    [J]. PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 215 - +
  • [2] An Identity-Based Encryption Scheme with Compact Ciphertexts
    刘胜利
    郭宝安
    张庆胜
    [J]. Journal of Shanghai Jiaotong University(Science), 2009, 14 (01) : 86 - 89
  • [3] New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
    Luo, Song
    Chen, Yu
    Hu, Jianbin
    Chen, Zhong
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 55 - 70
  • [4] Identity-based encryption scheme with compact ciphertexts
    Liu S.-L.
    Guo B.-A.
    Zhang Q.-S.
    [J]. Journal of Shanghai Jiaotong University (Science), 2009, 14 (1) : 86 - 89
  • [5] Anonymous hierarchical identity-based encryption (Without random oracles)
    Boyen, Xavier
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 290 - 307
  • [6] Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions
    Wu, Huangting
    Chow, Sherman S. M.
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023, 2023, 13906 : 366 - 395
  • [7] Anonymous Identity-Based Encryption with Identity Recovery
    Ma, Xuecheng
    Wang, Xin
    Lin, Dongdai
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 360 - 375
  • [8] Anonymous hierarchical identity-based encryption without key delegation in decryption
    Luo, Song
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 306 - 317
  • [9] Anonymous Multireceiver Identity-Based Encryption
    Fan, Chun-I
    Huang, Ling-Ying
    Ho, Pei-Hsiu
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (09) : 1239 - 1249
  • [10] Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities
    Nguyen, Ngoc Ai Van
    Pham, Minh Thuy Truc
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 84