Efficient dynamic threshold identity-based encryption with constant-size ciphertext

被引:4
|
作者
Susilo, Willy [1 ]
Guo, Fuchun [1 ]
Mu, Yi [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2500, Australia
关键词
Threshold identity-based encryption; Dynamic; Constant-size; PUBLIC-KEY ENCRYPTION; ADAPTIVE SECURITY;
D O I
10.1016/j.tcs.2015.09.006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper revisits the notion of dynamic threshold identity-based encryption, due to the recent practical interest. In this notion, an encryptor selects n recipients and a threshold value t for the creation of the ciphertext. The plaintext can only be recovered if at least t receivers cooperate. The key issue in this notion is its dynamicity, where after the users enroll to the system, the sender can dynamically select the set of recipients as well as dynamically set the threshold t upon the creation of the ciphertext. Another essential feature of this notion is the need for a constant-size ciphertext. Interestingly, the work by Delerablee and Pointcheval in Crypto 2008 is the only work that achieves this essential feature. In this work, we propose a new scheme achieving all of these nice properties with significant improvements in terms of the computational efficiency (both the encryption and decryption). In our scheme, there is no need to conduct any encryption and decryption using additional dummy users, which are not part of the recipient group, which is in contrast to Delerablee and Pointcheval's work. This improvement has significantly reduced the amount of computations required in both encryption and decryption algorithms. (C) 2015 Elsevier B.V. All rights reserved.
引用
下载
收藏
页码:49 / 59
页数:11
相关论文
共 50 条
  • [1] Hierarchical Identity-Based Encryption with Constant-Size Private Keys
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    ETRI JOURNAL, 2012, 34 (01) : 142 - 145
  • [2] Efficient Hidden Vector Encryption with Constant-Size Ciphertext
    Tran Viet Xuan Phuong
    Yang, Guomin
    Susilo, Willy
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 472 - 487
  • [3] Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost
    Chen, Cheng
    Zhang, Zhenfeng
    Feng, Dengguo
    PROVABLE SECURITY, 2011, 6980 : 84 - 101
  • [4] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang Yang
    Yu-pu Hu
    Le-you Zhang
    Chun-hui Sun
    Journal of Zhejiang University SCIENCE C, 2011, 12 : 819 - 827
  • [6] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang YANG Yupu HU Leyou ZHANG Chunhui SUN Department of Communication EngineeringXidian UniversityXian China Department of Mathematics and Computer ScienceFuzhou UniversityFuzhou China Department of Mathematics ScienceXidian UniversityXian China
    JournalofZhejiangUniversity-ScienceC(Computers&Electronics), 2011, 12 (10) : 819 - 827
  • [7] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang, Yang
    Hu, Yu-pu
    Zhang, Le-you
    Sun, Chun-hui
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2011, 12 (10): : 819 - 827
  • [8] Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts
    Zhao, Zhen
    Guo, Fuchun
    Lai, Jianchang
    Susilo, Willy
    Wang, Baocang
    Hu, Yupu
    THEORETICAL COMPUTER SCIENCE, 2020, 809 : 73 - 87
  • [9] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Liqing Chen
    Jiguo Li
    Yichen Zhang
    Soft Computing, 2020, 24 : 4589 - 4606
  • [10] Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
    Liang, Kaitai
    Chu, Cheng-Kang
    Tan, Xiao
    Wong, Duncan S.
    Tang, Chunming
    Zhou, Jianying
    THEORETICAL COMPUTER SCIENCE, 2014, 539 : 87 - 105