New Construction of Fuzzy Identity-Based Encryption

被引:5
|
作者
Li, XiMing [1 ]
Yang, Bo [1 ]
Zhang, MingWu [1 ]
机构
[1] S China Agr Univ, Informat Coll, Guangzhou, Guangdong, Peoples R China
关键词
Fuzzy Identity-Based Encryption; Decisional Bilinear Diffie-Hellman Assumption; dynamic threshold;
D O I
10.1109/ICIE.2009.175
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper the concept of Fuzzy Identity-Based Encryption schemes with dynamic threshold (DT-FIBE) is proposed and one construction of it is presented. DT-FIBE scheme can be viewed as a variant of SW scheme described by Amit Sahai and Brent Waters in EUROCRYPT 2005 in which the threshold is fixed. The scheme are both error-tolerant and secure against collusion attacks in the fuzzy selective-ID attack model. Under a new complexity assumption: k-BDH assumption, a comprehensive secure proof is given.
引用
下载
收藏
页码:647 / 651
页数:5
相关论文
共 50 条
  • [1] Fuzzy identity-based encryption
    Sahai, A
    Waters, B
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473
  • [2] Fuzzy Identity-based Encryption: New and Efficient Schemes
    Baek, Joonsang
    Susilo, Willy
    Zhou, Jianying
    CODING AND CRYPTOLOGY, 2008, 4 : 1 - +
  • [3] New Fuzzy Identity-Based Encryption in the Standard Model
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpeng
    INFORMATICA, 2010, 21 (03) : 393 - 407
  • [4] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [5] Improvement on a Fuzzy Identity-based Encryption Scheme
    Zhang, Guoyan
    Wang, Feng
    JOURNAL OF COMPUTERS, 2014, 9 (11) : 2727 - 2732
  • [6] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [7] Secure Symmetric Key Fuzzy Identity-Based Encryption
    Liu, Pengtao
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2665 - 2668
  • [8] SECURITY ANALYSIS OF A FUZZY IDENTITY-BASED ENCRYPTION SCHEME
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2014, 23 (03)
  • [9] Fuzzy Identity-Based Matchmaking Encryption and Its Application
    Wu, Axin
    Luo, Weiqi
    Weng, Jian
    Yang, Anjia
    Wen, Jinghang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5592 - 5607
  • [10] Anonymous Fuzzy Identity-Based Encryption for Similarity Search
    Cheung, David W.
    Mamoulis, Nikos
    Wong, W. K.
    Yiu, S. M.
    Zhang, Ye
    ALGORITHMS AND COMPUTATION, PT I, 2010, 6506 : 61 - 72