Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts

被引:10
|
作者
Seo, Jae Hong [1 ,2 ]
Kobayashi, Tetsutaro [3 ]
Ohkubo, Miyako [4 ]
Suzuki, Koutarou [3 ]
机构
[1] Seoul Natl Univ, Dept Math, Seoul 151, South Korea
[2] ISaC RIM, Seoul, South Korea
[3] NTT Corp, NTT Informat Sharing Platform Labs, Musashino, Tokyo 1808585, Japan
[4] Natl Inst Informat & Commun Technol, Koganei, Tokyo 1848795, Japan
关键词
anonymous identity-based encryption; anonymous hierarchical identity-based encryption; public-key encryption with keyword search; RANDOM ORACLES; HIBE; IBE;
D O I
10.1587/transfun.E94.A.45
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an anonymous Hierarchical Identity-Based Encryption (anonymous HIBE) scheme with short ciphertexts. Prior to our work, most anonymous HIBE schemes have long ciphertexts increased according to the hierarchical depth of recipient. The size of the ciphertext in our scheme does not depend on the depth of the hierarchy. Moreover, our scheme achieves the lowest computational cost because during the decryption phase the computational cost of decryption is constant. The security can be proven under reasonable assumptions without using random oracles. Our scheme achieves selective-ID security notion.
引用
收藏
页码:45 / 56
页数:12
相关论文
共 50 条
  • [31] Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT
    Jiang, Liaoliang
    Li, Tong
    Li, Xuan
    Atiquzzaman, Mohammed
    Ahmad, Haseeb
    Wang, Xianmin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [32] Cryptanalysis of RNZ, an identity-based fully anonymous broadcast encryption
    Mandal, Mriganka
    [J]. ICT EXPRESS, 2020, 6 (04): : 316 - 319
  • [33] Improved Anonymous Multi-receiver Identity-Based Encryption
    Chien, Hung-Yu
    [J]. COMPUTER JOURNAL, 2012, 55 (04): : 439 - 446
  • [34] Identity Based Group Signatures from Hierarchical Identity-Based Encryption
    Smart, Nigel P.
    Warinschi, Bogdan
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 150 - 170
  • [35] Hierarchical identity-based inner product functional encryption
    Song, Ge
    Deng, Yuqiao
    Huang, Qiong
    Peng, Changgen
    Tang, Chunming
    Wang, Xiaohua
    [J]. INFORMATION SCIENCES, 2021, 573 : 332 - 344
  • [37] Timed-Release Hierarchical Identity-Based Encryption
    Oshikiri, Toru
    Saito, Taiichi
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (11) : 148 - 154
  • [39] Generalized key delegation for hierarchical identity-based encryption
    Abdalla, Michel
    Kiltz, Eike
    Neven, Gregory
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 139 - 154
  • [40] Generalised key delegation for hierarchical identity-based encryption
    Abdalla, M.
    Kiltz, E.
    Neven, G.
    [J]. IET INFORMATION SECURITY, 2008, 2 (03) : 67 - 78