Leakage-resilient identity-based encryption scheme

被引:2
|
作者
Li, Sujuan [1 ,2 ]
Zhang, Futai [1 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing 210023, Jiangsu, Peoples R China
[2] Nanjing Univ Technol, Sch Sci, Nanjing 210009, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
leakage-resilient; identity-based encryption; identity-based hash proof system; D-square-BDH;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a leakage-resilient Identity-Based Encryption (IBE) scheme in the relative leakage mode. The semantic security of the proposed scheme is proved in two ways in the random oracle model under the Decisional Square Bilinear Diffie-Hellman (D-Square-BDH) assumption. Compared with some existing leakage-resilient IBE schemes, our construction enjoys a shorter parameter length, a lower computation cost and a higher ratio of the key leakage for the same level of security.
引用
收藏
页码:187 / 196
页数:10
相关论文
共 50 条
  • [41] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    [J]. COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
  • [42] Leakage-resilient Certificateless Signcryption Scheme
    Yang, Qiliang
    Thou, Yanwei
    Yu, Yong
    [J]. 2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [43] An identity-based encryption scheme for broadcasting
    Yang, Geng
    Wang, Jiangtao
    Cheng, Hongbing
    Rong, Chunming
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 123 - +
  • [44] Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding
    Zhang, Yijian
    Ling, Yunhao
    Chen, Jie
    Wang, Luping
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2023, PT II, 2024, 14562 : 113 - 132
  • [45] Leakage-Resilient Functional Encryption via Pair Encodings
    Yu, Zuoxia
    Au, Man Ho
    Xu, Qiuliang
    Yang, Rupeng
    Han, Jinguang
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 443 - 460
  • [46] IRIBE: Intrusion-resilient identity-based encryption
    Yu, Jia
    Hao, Rong
    Zhao, Huawei
    Shu, Minglei
    Fan, Jianxi
    [J]. INFORMATION SCIENCES, 2016, 329 : 90 - 104
  • [47] A leakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei ZHOU
    Bo YANG
    Hao CHENG
    Qing-long WANG
    [J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19 (04) : 481 - 493
  • [48] Verifiable memory leakage-resilient dynamic searchable encryption
    Guan, Wenhao
    Wang, Yunling
    Wang, Jianfeng
    Fu, Xiaotong
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2018, 24 (03) : 201 - 217
  • [49] Leakage-Resilient Certificateless Key Encapsulation Scheme
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Chou, Wei-Chieh
    [J]. INFORMATICA, 2018, 29 (01) : 125 - 155
  • [50] A Lightweight Leakage-Resilient Identity-Based Mutual Authentication and Key Exchange Protocol for Resource-limited Devices
    Tseng, Yuh-Min
    Chen, Jian-Lun
    Huang, Sen-Shan
    [J]. COMPUTER NETWORKS, 2021, 196