Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts

被引:0
|
作者
Seo, Jae Hong [1 ,3 ]
Kobayashi, Tetsutaro [2 ]
Ohkubo, Miyako [2 ]
Suzuki, Koutarou [2 ]
机构
[1] Seoul Natl Univ, Dept Math Sci, Seoul, South Korea
[2] NTT Informat Sharing Platform Labs, Tokyo, Japan
[3] Seoul Natl Univ, ISaC RIM, Seoul, South Korea
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose an anonymous Bierarchical Identity-Based Encryption (anonymous HIBE) scheme that has constant size ciphertexts. This means the size of the ciphertext does not depend on the depth of the hierarchy. Moreover, our scheme achieves the lowest computational cost because during the decryption phase the computational cost of decryption is constant. The security can be proven under reasonable assumptions without using random oracles because it is based on the composite order bilinear group. Our scheme achieves selective-ID security notion.
引用
收藏
页码:215 / +
页数:3
相关论文
共 50 条
  • [21] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [22] On the Power of Hierarchical Identity-Based Encryption
    Mahmoody, Mohammad
    Mohammed, Ameer
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 243 - 272
  • [23] Anonymous Hierarchical Identity-based Encryption EHR Sharing Mechanism Based on SM9
    Ying, Zuobin
    Liu, Minghao
    Kong, Siofong
    Xu, Shengmin
    Xiong, Jinbo
    [J]. 2022 IEEE 21ST INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS, IUCC/CIT/DSCI/SMARTCNS, 2022, : 17 - 22
  • [24] Anonymous Lattice Identity-Based Encryption with Traceable Identities
    Boyen, Xavier
    Foo, Ernest
    Li, Qinyi
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 630 - 649
  • [25] An Anonymous Multireceiver with Online/Offline Identity-Based Encryption
    Wang, Qihua
    Li, Fagen
    Wang, Huaqun
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [26] Anonymous Identity-Based Encryption with Bounded Leakage Resilience
    Liu, Pengtao
    Hu, Chengyu
    Guo, Shanqing
    Wang, Yilei
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 287 - 292
  • [27] Anonymous Fuzzy Identity-Based Encryption for Similarity Search
    Cheung, David W.
    Mamoulis, Nikos
    Wong, W. K.
    Yiu, S. M.
    Zhang, Ye
    [J]. ALGORITHMS AND COMPUTATION, PT I, 2010, 6506 : 61 - 72
  • [28] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 539 - 549
  • [29] Constant Size Ciphertexts in Threshold Attribute-Based Encryption
    Herranz, Javier
    Laguillaumie, Fabien
    Rafols, Carla
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 19 - +
  • [30] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549