Efficient dynamic threshold identity-based encryption with constant-size ciphertext

被引:4
|
作者
Susilo, Willy [1 ]
Guo, Fuchun [1 ]
Mu, Yi [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2500, Australia
关键词
Threshold identity-based encryption; Dynamic; Constant-size; PUBLIC-KEY ENCRYPTION; ADAPTIVE SECURITY;
D O I
10.1016/j.tcs.2015.09.006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper revisits the notion of dynamic threshold identity-based encryption, due to the recent practical interest. In this notion, an encryptor selects n recipients and a threshold value t for the creation of the ciphertext. The plaintext can only be recovered if at least t receivers cooperate. The key issue in this notion is its dynamicity, where after the users enroll to the system, the sender can dynamically select the set of recipients as well as dynamically set the threshold t upon the creation of the ciphertext. Another essential feature of this notion is the need for a constant-size ciphertext. Interestingly, the work by Delerablee and Pointcheval in Crypto 2008 is the only work that achieves this essential feature. In this work, we propose a new scheme achieving all of these nice properties with significant improvements in terms of the computational efficiency (both the encryption and decryption). In our scheme, there is no need to conduct any encryption and decryption using additional dummy users, which are not part of the recipient group, which is in contrast to Delerablee and Pointcheval's work. This improvement has significantly reduced the amount of computations required in both encryption and decryption algorithms. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:49 / 59
页数:11
相关论文
共 50 条
  • [31] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
  • [32] Identity-based broadcast encryption with constant size ciphertexts and private keys
    Delerablee, Cecile
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 200 - 215
  • [33] Chosen-ciphertext security from identity-based encryption
    Boneh, Dan
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    SIAM JOURNAL ON COMPUTING, 2006, 36 (05) : 1301 - 1328
  • [34] Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
    Susilo, Willy
    Yang, Guomin
    Guo, Fuchun
    Huang, Qiong
    INFORMATION SCIENCES, 2018, 429 : 349 - 360
  • [35] Expressive attribute-based keyword search with constant-size ciphertext
    Han, Jinguang
    Yang, Ye
    Liu, Joseph K.
    Li, Jiguo
    Liang, Kaitai
    Shen, Jian
    SOFT COMPUTING, 2018, 22 (15) : 5163 - 5177
  • [36] Efficient biometric identity-based encryption
    Li, Xiaoguo
    Xiang, Tao
    Chen, Fei
    Guo, Shangwei
    INFORMATION SCIENCES, 2018, 465 : 248 - 264
  • [37] Identity-based Encryption with Efficient Revocation
    Boldyreva, Alexandra
    Goyal, Vipul
    Kumar, Virendra
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 417 - 426
  • [38] Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption
    Kuchta, Veronika
    Markowitch, Olivier
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 : 117 - 129
  • [39] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [40] Revocable identity-based encryption with server-aided ciphertext evolution
    Sun, Yinxia
    Mu, Yi
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    THEORETICAL COMPUTER SCIENCE, 2020, 815 : 11 - 24