An Improved Identity-Based Encryption Scheme without Bilinear Map

被引:2
|
作者
Zheng, Minghui [1 ]
Zhou, Huihua [1 ]
Cui, Guohua [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp Sci, Wuhan 430074, Peoples R China
关键词
Cryptography; Identity-Based Encryption; MOV reduction; bilinear map;
D O I
10.1109/MINES.2009.171
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
According to the MOV reduction theory, the Identity-Based Encryption (IBE) scheme basing on the bilinear map will lose the high efficiency of elliptic curve. So it is meaningful to build the provably secure Identity-based encryption scheme, but which is without the bilinear map. In this paper, based on this existing result and our new research, an improved IBE scheme will be proposed. But it is different from previous scheme that the new scheme is without symmetric encryption, and at the same time having strong provable security. At last, we will analyze the performance of this new scheme.
引用
收藏
页码:374 / 377
页数:4
相关论文
共 50 条
  • [1] A practical identity-based signature scheme from bilinear map
    Wang, Zhu
    Chen, Huiyan
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 704 - +
  • [2] An Efficient Identity-Based Signcryption Scheme Without Bilinear Pairings
    Elkamchouchi, Hassan
    Abou El-kheir, Eman
    Abouelseoud, Yasmine
    [J]. 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, : 80 - 85
  • [3] Identity-Based Directed Signature Scheme without Bilinear Pairings
    Rao, R. R. V. Krishna
    Gayathri, N. B.
    Reddy, P. Vasudeva
    [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 335 - 353
  • [4] An Efficient Fuzzy Identity-based Signature Scheme without Bilinear Pairings
    Wang, Changji
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 440 - 444
  • [5] An efficient identity-based blind signature scheme without bilinear pairings
    He, Debiao
    Chen, Jianhua
    Zhang, Rui
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (04) : 444 - 450
  • [6] Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings
    Qi Yanfeng
    Tang Chunming
    Lou Yu
    Xu Maozhi
    Guo Baoan
    [J]. CHINA COMMUNICATIONS, 2013, 10 (11) : 37 - 41
  • [7] An identity-based encryption scheme for broadcasting
    Yang, Geng
    Wang, Jiangtao
    Cheng, Hongbing
    Rong, Chunming
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 123 - +
  • [8] An improved anonymous multi-receiver identity-based encryption scheme
    Zhang, Jianhong
    Mao, Jian
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (04) : 645 - 658
  • [9] On Anonymization of Cocks' Identity-based Encryption Scheme
    Nica, Anca-Maria
    Tiplea, Ferucio Laurentiu
    [J]. COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2019, 27 (03) : 283 - 298
  • [10] Improvement on a Fuzzy Identity-based Encryption Scheme
    Zhang, Guoyan
    Wang, Feng
    [J]. JOURNAL OF COMPUTERS, 2014, 9 (11) : 2727 - 2732