Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts

被引:0
|
作者
Zhen-Chuan Chai
Zhen-Fu Cao
Yuan Zhou
机构
[1] Shanghai Jiao Tong University,Department of Computer Science and Engineering
[2] National Computer Networks and Information Security Center,undefined
关键词
ID-based cryptography; multi-user cryptography; proven security; random oracle;
D O I
暂无
中图分类号
学科分类号
摘要
Multi-decrypter encryption is a typical application in multi-user cryptographic branches. In multi-decrypter encryption, a message is encrypted under multiple decrypters’ public keys in the way that only when all the decrypters cooperate, can the message be read. However, trivial implementation of multi-decrypter encryption using standard approaches leads to heavy computation costs and long ciphertext which grows as the receiver group expands. This consumes much precious bandwidth in wireless environment, such as mobile ad hoc network. In this paper, we propose an efficient identity based multi-decrypter encryption scheme, which needs only one or zero (if precomputed) pairing computation and the ciphertext contains only three group elements no matter how many the receivers are. Moreover, we give a formal security definition for the scheme, and prove the scheme to be chosen ciphertext secure in the random oracle model, and discuss how to modify the scheme to resist chosen ciphertext attack.
引用
收藏
页码:103 / 108
页数:5
相关论文
共 50 条
  • [1] Efficient ID-based multi-decrypter encryption with short ciphertexts
    Chai, Zhen-Chuan
    Cao, Zhen-Fu
    Zhou, Yuan
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 103 - 108
  • [2] Efficient Revocable Multi-Receiver ID-Based Encryption
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 159 - 169
  • [3] Efficient hybrid encryption from ID-based encryption
    Masayuki Abe
    Yang Cui
    Hideki Imai
    Eike Kiltz
    [J]. Designs, Codes and Cryptography, 2010, 54 : 205 - 240
  • [4] Efficient hybrid encryption from ID-based encryption
    Abe, Masayuki
    Cui, Yang
    Imai, Hideki
    Kiltz, Eike
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2010, 54 (03) : 205 - 240
  • [5] A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles
    Wang, Shengbao
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    Wang, Hongbing
    [J]. INFORMATICA, 2015, 26 (03) : 543 - 556
  • [6] Efficient Revocable ID-Based Encryption with a Public Channel
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    [J]. COMPUTER JOURNAL, 2012, 55 (04): : 475 - 486
  • [7] Efficient searchable ID-based encryption with a designated server
    Tsu-Yang Wu
    Tung-Tso Tsai
    Yuh-Min Tseng
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 391 - 402
  • [8] Efficient searchable ID-based encryption with a designated server
    Wu, Tsu-Yang
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    [J]. ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) : 391 - 402
  • [9] Efficient ID-based broadcast encryption scheme - Comments
    Chien, Hung-Yu
    [J]. IEEE TRANSACTIONS ON BROADCASTING, 2007, 53 (04) : 809 - 810
  • [10] Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
    Wu, Qianhong
    Qin, Bo
    Zhang, Lei
    Domingo-Ferrer, Josep
    Farras, Oriol
    Manjon, Jesus A.
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (02) : 466 - 479