New Construction of Fuzzy Identity-Based Encryption

被引:5
|
作者
Li, XiMing [1 ]
Yang, Bo [1 ]
Zhang, MingWu [1 ]
机构
[1] S China Agr Univ, Informat Coll, Guangzhou, Guangdong, Peoples R China
关键词
Fuzzy Identity-Based Encryption; Decisional Bilinear Diffie-Hellman Assumption; dynamic threshold;
D O I
10.1109/ICIE.2009.175
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper the concept of Fuzzy Identity-Based Encryption schemes with dynamic threshold (DT-FIBE) is proposed and one construction of it is presented. DT-FIBE scheme can be viewed as a variant of SW scheme described by Amit Sahai and Brent Waters in EUROCRYPT 2005 in which the threshold is fixed. The scheme are both error-tolerant and secure against collusion attacks in the fuzzy selective-ID attack model. Under a new complexity assumption: k-BDH assumption, a comprehensive secure proof is given.
引用
收藏
页码:647 / 651
页数:5
相关论文
共 50 条
  • [21] Identity-based encryption: A new technology for information security
    Xu Yixian
    Gao Qiang
    Wu Jiang
    ICCSE'2006: Proceedings of the First International Conference on Computer Science & Education: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2006, : 561 - 564
  • [22] A new practical Limited identity-based encryption scheme
    Lu, Rongxing
    Cao, Zhenfu
    Dong, Xiaolei
    FUNDAMENTA INFORMATICAE, 2007, 80 (04) : 461 - 474
  • [23] Generic construction of public key encryption, identity-based encryption and signcryption with equality test
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    INFORMATION SCIENCES, 2018, 453 : 111 - 126
  • [24] On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption
    Wan, Zhong-Mei
    Weng, Jian
    Lai, Xue-Jia
    Liu, Sheng-Li
    Li, Ji-Guo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 243 - 259
  • [25] Identity-Based Authenticated Encryption with Identity Confidentiality
    Zhao, Yunlei
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 633 - 653
  • [26] Fully secure fuzzy identity-based encryption for secure IoT communications
    Mao, Yijun
    Li, Jin
    Chen, Min-Rong
    Liu, Jianan
    Xie, Congge
    Zhan, Yiju
    COMPUTER STANDARDS & INTERFACES, 2016, 44 : 117 - 121
  • [27] Anonymous Identity-Based Encryption with Identity Recovery
    Ma, Xuecheng
    Wang, Xin
    Lin, Dongdai
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 360 - 375
  • [28] Identity-based authenticated encryption with identity confidentiality
    Shen, Shiyu
    Wang, Hongbing
    Zhao, Yunlei
    THEORETICAL COMPUTER SCIENCE, 2022, 901 : 1 - 18
  • [29] A generic construction for revocable identity-based encryption with subset difference methods
    Lee, Kwangsu
    PLOS ONE, 2020, 15 (09):
  • [30] A new construction of identity-based group signature
    Ma, Liqiong
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2014, 6 (01) : 38 - 43