Efficient dynamic threshold identity-based encryption with constant-size ciphertext

被引:4
|
作者
Susilo, Willy [1 ]
Guo, Fuchun [1 ]
Mu, Yi [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2500, Australia
关键词
Threshold identity-based encryption; Dynamic; Constant-size; PUBLIC-KEY ENCRYPTION; ADAPTIVE SECURITY;
D O I
10.1016/j.tcs.2015.09.006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper revisits the notion of dynamic threshold identity-based encryption, due to the recent practical interest. In this notion, an encryptor selects n recipients and a threshold value t for the creation of the ciphertext. The plaintext can only be recovered if at least t receivers cooperate. The key issue in this notion is its dynamicity, where after the users enroll to the system, the sender can dynamically select the set of recipients as well as dynamically set the threshold t upon the creation of the ciphertext. Another essential feature of this notion is the need for a constant-size ciphertext. Interestingly, the work by Delerablee and Pointcheval in Crypto 2008 is the only work that achieves this essential feature. In this work, we propose a new scheme achieving all of these nice properties with significant improvements in terms of the computational efficiency (both the encryption and decryption). In our scheme, there is no need to conduct any encryption and decryption using additional dummy users, which are not part of the recipient group, which is in contrast to Delerablee and Pointcheval's work. This improvement has significantly reduced the amount of computations required in both encryption and decryption algorithms. (C) 2015 Elsevier B.V. All rights reserved.
引用
下载
收藏
页码:49 / 59
页数:11
相关论文
共 50 条
  • [21] Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext
    Kim, Jongkil
    Susilo, Willy
    Au, Man Ho
    Seberry, Jennifer
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 679 - 693
  • [22] Ciphertext-auditable identity-based encryption
    Lin, Changlu
    Li, Yong
    Lv, Kewei
    Chang, Chin-Chen
    International Journal of Network Security, 2015, 17 (01) : 23 - 28
  • [23] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [24] Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption
    Canard, Sebastien
    Viet Cuong Trinh
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 193 - 211
  • [25] Expressive Attribute Based Signcryption with Constant-Size Ciphertext
    Rao, Y. Sreenivasa
    Dutta, Ratna
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 398 - 419
  • [26] Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 215 - +
  • [27] Efficient Multi-Authority Attribute-Based Signcryption with Constant-Size Ciphertext
    Zhao, Yang
    Ruan, Ankang
    Dan, Guohang
    Huang, Jicheng
    Ding, Yi
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [28] Chosen Ciphertext Secure Fuzzy Identity-Based Encryption Scheme With Short Ciphertext
    Shi, Wenbo
    Jang, Injoo
    Yoo, Hyeong Seon
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1036 - 1040
  • [29] An efficient revocable identity-based encryption with ciphertext evolution in the cloud-assisted system
    Chen, Zhiwei
    Deng, Lunzhi
    Ruan, Yu
    Feng, Shuai
    Wang, Tao
    Wang, Bo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (22):
  • [30] Efficient chosen ciphertext secure identity-based encryption against key leakage attacks
    Sun, Shi-Feng
    Gu, Dawu
    Liu, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1417 - 1434