Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys

被引:7
|
作者
Zhang, Leyou [1 ,2 ]
Mu, Yi [2 ]
Wu, Qing [3 ]
机构
[1] Xidian Univ, Sch Math & Stat, Xian 710071, Shaanxi, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[3] Xian Univ Posts & Telecommun, Sch Automat, Xian 710121, Shaanxi, Peoples R China
来源
COMPUTER JOURNAL | 2016年 / 59卷 / 04期
关键词
anonymity; hierarchical identity-based encryption; prime order groups; constant size private keys; HIBE; IBE;
D O I
10.1093/comjnl/bxv059
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new construction of anonymous hierarchical identity-based encryption (HIBE) over prime order groups. The distinct feature of our proposed scheme is that both private key and ciphertext have a constant size, which has never been achieved in all other existing anonymous HIBE schemes. Moreover, we utilized a double exponent technique to generate the ciphertext in order to provide anonymity. This simple and efficient method allows us to construct a more compact anonymous HIBE in prime order groups. Under the decisional bilinear n + 1-Diffie-Hellman exponent assumption and linear assumption, we show that the proposed scheme is secure and anonymous against chosen plaintext attacks in the standard model.
引用
收藏
页码:452 / 461
页数:10
相关论文
共 50 条
  • [1] Hierarchical Identity-Based Encryption with Constant-Size Private Keys
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    [J]. ETRI JOURNAL, 2012, 34 (01) : 142 - 145
  • [2] Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    [J]. PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 215 - +
  • [3] Identity-based broadcast encryption with constant size ciphertexts and private keys
    Delerablee, Cecile
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 200 - 215
  • [4] Revocable hierarchical identity-based encryption with shorter private keys and update keys
    Kwangsu Lee
    Seunghwan Park
    [J]. Designs, Codes and Cryptography, 2018, 86 : 2407 - 2440
  • [5] Revocable hierarchical identity-based encryption with shorter private keys and update keys
    Lee, Kwangsu
    Park, Seunghwan
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (10) : 2407 - 2440
  • [6] Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts
    Zhao, Zhen
    Guo, Fuchun
    Lai, Jianchang
    Susilo, Willy
    Wang, Baocang
    Hu, Yupu
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 809 : 73 - 87
  • [7] Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 12 - 18
  • [8] Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    Xian, He-Qun
    [J]. COMPUTER JOURNAL, 2019, 62 (08): : 1087 - 1091
  • [9] Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 45 - 56
  • [10] Anonymous hierarchical identity-based encryption (Without random oracles)
    Boyen, Xavier
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 290 - 307