An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks

被引:7
|
作者
Chang, Ting-Yi [1 ]
机构
[1] Natl Changhua Univ Educ, Grad Inst E Learning, Changhua, Taiwan
关键词
ID-based cryptography; Bilinear Diffle-Hellman problem; Group-oriented decryption; Chosen-ciphertext security; ENCRYPTION SCHEME; SIGNATURE; CRYPTOSYSTEM;
D O I
10.1016/j.comcom.2009.07.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ID-based decryption allows a sender to encrypt a message to an identity without access to a public key certificate. This paper proposes an ID-based group-oriented decryption scheme, secure against adaptive chosen-ciphertext attacks, which allows the sender to determine an access structure and generate a valid ciphertext on the chosen message. The correctness of decryption shares can be checked to detect when dishonest users in the access structure provide fake decryption shares. As a result, the message can be cooperatively recovered by users in the determined access structure. The formal proof of security of our scheme is based on the bilinear Diffie-Hellman problem in the random oracle model. Our proposed scheme is more efficient and provides higher security confidence than those in Li et al.'s certificate-based group-oriented decryption scheme. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1829 / 1836
页数:8
相关论文
共 35 条
  • [1] ID-based threshold decryption secure against adaptive chosen-ciphertext attack
    Long, Yu
    Chen, Kefei
    Liu, Shengli
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (03) : 166 - 176
  • [3] Direct chosen-ciphertext secure hierarchical ID-Based encryption schemes
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 94 - +
  • [4] Broadcast group-oriented encryption secure against chosen ciphertext attack
    Ma Chunbo
    The State Key Laboratory of Information Security
    State Key Laboratory for Radar Signal Processing
    [J]. Journal of Systems Engineering and Electronics, 2007, (04) : 811 - 817
  • [5] Broadcast group-oriented encryption secure against chosen ciphertext attack
    Ma Chunbo
    Ao Jun
    Li Jianhua
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2007, 18 (04) : 811 - 817
  • [6] ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack
    龙宇
    陈克非
    刘胜利
    [J]. Journal of Shanghai Jiaotong University(Science), 2006, (02) : 127 - 133
  • [7] Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
    Fehr, Serge
    Hofheinz, Dennis
    Kiltz, Eike
    Wee, Hoeteck
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 381 - +
  • [8] ID-based group-oriented cryptosystem and its digital signature scheme
    Wu, TC
    Su, RL
    [J]. COMPUTER COMMUNICATIONS, 1997, 20 (11) : 1019 - 1026
  • [9] Efficient chosen-ciphertext secure hybrid encryption scheme tolerating continuous leakage attacks
    Zhou, Yanwei
    Yang, Bo
    Yu, Yong
    Khan, Arshad
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 39 - 47
  • [10] Security Analysis of Several Chosen Ciphertext Secure Group-oriented Encryption Schemes
    Wang, Xu An
    Nie, Jinting
    Wang, Wei
    [J]. PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 507 - 510