A New Key-Aggregate Encryption Scheme with Chosen Ciphertext Security

被引:0
|
作者
Lan, Caihui [1 ]
Li, Haifeng [2 ]
Wang, Caifen [3 ]
机构
[1] Lanzhou City Univ, Coll Informat Engn, Lanzhou, Peoples R China
[2] Dalian Univ Technol, Sch Software, Dalian, Peoples R China
[3] Northwest Normal Univ, Comp Sci & Engn, Lanzhou, Peoples R China
关键词
key-aggregate encryption; chosen ciphertext attack (CCA); the random oracle model (ROM);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a key-aggregate encryption scheme, different secret keys for decrypting different categories of ciphertext can be aggregated to a single key, and a ciphertext can be decrypted with the key iff the ciphertext's class belongs to the set which the key includes categories. A promising application of key-aggregate encryption is convenient of data sharing in outside storage. In this work, the authors propose a new key-aggregate encryption scheme. The new scheme is chosen ciphertext secure in ROM and easy to append an additional new class.
引用
收藏
页码:229 / 233
页数:5
相关论文
共 50 条
  • [21] Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage
    Yao, Yanqing
    Zhai, Zhengde
    Liu, Jianwei
    Li, Zhoujun
    IEEE ACCESS, 2019, 7 : 164544 - 164555
  • [22] Chosen Ciphertext Security with Optimal Ciphertext Overhead
    Abe, Masayuki
    Kiltz, Eike
    Okamoto, Tatsuaki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 22 - 33
  • [23] Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
    Qin, Baodong
    Liu, Shengli
    Chen, Kefei
    IET INFORMATION SECURITY, 2015, 9 (01) : 32 - 42
  • [24] Chosen Ciphertext Security with Optimal Ciphertext Overhead
    Abe, Masayuki
    Kiltz, Eike
    Okamoto, Tatsuaki
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 355 - 371
  • [25] Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
    Weng, Jian
    Yang, Yanjiang
    Tang, Qiang
    Deng, Robert H.
    Bao, Feng
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 151 - +
  • [26] Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities
    Chiku, Sohto
    Hara, Keisuke
    Shikata, Junji
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 299 - 314
  • [27] Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
    He, Kai
    Weng, Jian
    Liu, Jia-Nan
    Liu, Joseph K.
    Liu, Wei
    Deng, Robert H.
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 247 - 255
  • [28] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [29] Chosen ciphertext secure public key threshold encryption without random oracles
    Boneh, D
    Boyen, X
    Halevi, S
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 226 - 243
  • [30] Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security
    Qiu, JunJie
    Hwang, Gi-Hyun
    Lee, HoonJae
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 104 - 110