Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys

被引:7
|
作者
Zhang, Leyou [1 ,2 ]
Mu, Yi [2 ]
Wu, Qing [3 ]
机构
[1] Xidian Univ, Sch Math & Stat, Xian 710071, Shaanxi, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[3] Xian Univ Posts & Telecommun, Sch Automat, Xian 710121, Shaanxi, Peoples R China
来源
COMPUTER JOURNAL | 2016年 / 59卷 / 04期
关键词
anonymity; hierarchical identity-based encryption; prime order groups; constant size private keys; HIBE; IBE;
D O I
10.1093/comjnl/bxv059
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new construction of anonymous hierarchical identity-based encryption (HIBE) over prime order groups. The distinct feature of our proposed scheme is that both private key and ciphertext have a constant size, which has never been achieved in all other existing anonymous HIBE schemes. Moreover, we utilized a double exponent technique to generate the ciphertext in order to provide anonymity. This simple and efficient method allows us to construct a more compact anonymous HIBE in prime order groups. Under the decisional bilinear n + 1-Diffie-Hellman exponent assumption and linear assumption, we show that the proposed scheme is secure and anonymous against chosen plaintext attacks in the standard model.
引用
收藏
页码:452 / 461
页数:10
相关论文
共 50 条
  • [31] An Identity-Based Encryption Scheme with Compact Ciphertexts
    刘胜利
    郭宝安
    张庆胜
    [J]. Journal of Shanghai Jiaotong University(Science), 2009, 14 (01) : 86 - 89
  • [32] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549
  • [33] Hierarchical Identity-Based Online/Offline Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Mu, Yi
    Guo, Fuchun
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2115 - +
  • [34] Tightly Secure Hierarchical Identity-Based Encryption
    Langrehr, Roman
    Pan, Jiaxin
    [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1787 - 1821
  • [35] Identity-based encryption scheme with compact ciphertexts
    Liu S.-L.
    Guo B.-A.
    Zhang Q.-S.
    [J]. Journal of Shanghai Jiaotong University (Science), 2009, 14 (1) : 86 - 89
  • [36] Tightly Secure Hierarchical Identity-Based Encryption
    Roman Langrehr
    Jiaxin Pan
    [J]. Journal of Cryptology, 2020, 33 : 1787 - 1821
  • [37] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [38] Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
    Camenisch, Jan
    Kohlweiss, Markulf
    Rial, Alfredo
    Sheedy, Caroline
    [J]. PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 196 - +
  • [39] Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems
    Liu, Zi-Yuan
    Mambo, Masahiro
    Tso, Raylin
    Tseng, Yi-Fan
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [40] Efficient dynamic threshold identity-based encryption with constant-size ciphertext
    Susilo, Willy
    Guo, Fuchun
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 609 : 49 - 59