Leakage-resilient identity-based encryption scheme

被引:2
|
作者
Li, Sujuan [1 ,2 ]
Zhang, Futai [1 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing 210023, Jiangsu, Peoples R China
[2] Nanjing Univ Technol, Sch Sci, Nanjing 210009, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
leakage-resilient; identity-based encryption; identity-based hash proof system; D-square-BDH;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a leakage-resilient Identity-Based Encryption (IBE) scheme in the relative leakage mode. The semantic security of the proposed scheme is proved in two ways in the random oracle model under the Decisional Square Bilinear Diffie-Hellman (D-Square-BDH) assumption. Compared with some existing leakage-resilient IBE schemes, our construction enjoys a shorter parameter length, a lower computation cost and a higher ratio of the key leakage for the same level of security.
引用
收藏
页码:187 / 196
页数:10
相关论文
共 50 条
  • [1] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    Zhou Yanwei
    Yang Bo
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (04) : 682 - 689
  • [2] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
    Li, Jiguo
    Teng, Meilin
    Zhang, Yichen
    Yu, Qihong
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075
  • [3] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    ZHOU Yanwei
    YANG Bo
    [J]. Chinese Journal of Electronics, 2019, 28 (04) : 682 - 689
  • [4] Continuous leakage-resilient identity-based encryption with leakage amplification
    Yanwei Zhou
    Bo Yang
    Yi Mu
    [J]. Designs, Codes and Cryptography, 2019, 87 : 2061 - 2090
  • [5] Continuous leakage-resilient identity-based encryption with leakage amplification
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (09) : 2061 - 2090
  • [6] Identity-Based and Leakage-Resilient Broadcast Encryption Scheme for Cloud Storage Service
    Yu, Qihong
    Li, Jiguo
    Ji, Sai
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (22):
  • [7] Continuous Leakage-Resilient Identity-Based Encryption with Tight Security
    Zhou, Yanwei
    Yang, Bo
    Hou, Hongxia
    Zhang, Lina
    Wang, Tao
    Hu, Mingxiao
    [J]. COMPUTER JOURNAL, 2019, 62 (08): : 1092 - 1105
  • [8] Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
    Zhang, Yinghui
    Yang, Menglei
    Zheng, Dong
    Zhang, Tiantian
    Guo, Rui
    Ren, Fang
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 665 - 681
  • [9] Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    [J]. COMPUTER JOURNAL, 2018, 61 (04): : 586 - 600
  • [10] Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption
    Yu, Qihong
    Shen, Jian
    Lai, Jin-Feng
    Ji, Sai
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (06): : 1287 - 1296