Secure Outsourcing of Two Standard Identity-Based Cryptosystems

被引:0
|
作者
Saeidi, Mohammad Reza [1 ]
Mala, Hamid [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Esfahan, Iran
关键词
Checkability; Identity-Based; Encryption; Outsourcing; Security; ALGORITHMS;
D O I
10.22042/isecure.2023.320345.734
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last two decades, bilinear pairings have found many applications in cryptography. Meanwhile, identity-based cryptosystems based on bilinear pairings have received particular attention. The IEEE, IETF, and ISO organizations have been working on standardizing pairing-based cryptographic schemes. The Boneh-Franklin identity-based encryption and Sakai-Kasahara identity-based signature are the most well-known identity-based schemes that have been standardized. So far, researchers have proposed various schemes to reduce the computational overhead of pairing operations. All these schemes are trying to outsource pairing operations securely. However, besides pairing operations, there are other essential and costly operations in pairing-based cryptography and identity-based schemes, including scalar multiplication on elliptic curves. In this research, we outsource the Boneh-Franklin encryption in a more secure and efficient (in terms of computational and communication complexity) way than existing schemes. Also, we outsource the BLMQ signature (based on Sakai-Kasahara) scheme for the first time. The proposed schemes are secure in the OMTUP model. Also, unlike previous schemes, we considered communication channels insecure. Moreover, compared with the trivial solution, which outsources every single operation (such as pairing, scalar multiplication, and modular exponentiation) as a separate subroutine, our schemes offer less complexity by seamlessly outsourcing the whole encryption scheme for the first time.(c) 2020 ISC. All rights reserved.
引用
收藏
页码:216 / 229
页数:14
相关论文
共 50 条
  • [21] Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities
    Wang, Lihua
    Wang, Licheng
    Mambo, Masahiro
    Okamoto, Eiji
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 383 - +
  • [22] Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud
    Song, Lingwei
    Wei, Jinxia
    Wang, Licheng
    Cao, Chenlei
    Niu, Xinxin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (06): : 1930 - 1945
  • [23] Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage
    Cui, Yuanyou
    Su, Yunxuan
    Tu, Zheng
    Zhang, Jindan
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (05) : 469 - 479
  • [24] An improved semantically-secure identity-based signcryption scheme in the standard model
    Jin, Zhengping
    Wen, Qiaoyan
    Du, Hongzhen
    COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) : 545 - 552
  • [25] CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions
    Lin, Shen
    Li, Yu
    Chen, Jie
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 253 - 273
  • [26] An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model
    Tan, Syh-Yuan
    Chin, Ji-Jian
    Heng, Swee-Huay
    Goi, Bok-Min
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (04): : 910 - 922
  • [27] Efficient Forward-Secure Identity-Based Encryption Scheme in the Standard Model
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 62 - 69
  • [28] Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
    Li, Xiangxue
    Qian, Haifeng
    Weng, Jian
    Yu, Yu
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (3-4) : 503 - 511
  • [29] Full Secure Identity-based Encryption Scheme over Lattices in the Standard Model
    Wang Jizhong
    Wang Chunxiao
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 412 - 415
  • [30] Tightly Secure Identity-Based Multisignatures
    Yanai, Naoto
    2017 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2017,