A Forward Secure Identity Based Encryption Scheme with Master Key Update

被引:0
|
作者
Yang, Peng [1 ]
Matsuura, Kanta [1 ]
机构
[1] Univ Tokyo, Meguro Ku, Tokyo 1538505, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an identity based encryption scheme with forward security. Especially in our scheme, the top secret, called the master key, updates as time evolves. Our scheme is provably secure in the sense of FS-IND-ID-CPA based on DBDH assumption in standard model.
引用
收藏
页码:336 / 341
页数:6
相关论文
共 50 条
  • [31] Generic constructions of master-key KDM secure attribute-based encryption
    Pan, Jiaxin
    Qian, Chen
    Wagner, Benedikt
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (01) : 51 - 92
  • [32] Forward-secure ID based digital signature scheme with forward-secure private key generator
    Oh, Hyunok
    Kim, Jihye
    Shin, Ji Sun
    INFORMATION SCIENCES, 2018, 454 : 96 - 109
  • [33] Generic constructions of master-key KDM secure attribute-based encryption
    Jiaxin Pan
    Chen Qian
    Benedikt Wagner
    Designs, Codes and Cryptography, 2024, 92 : 51 - 92
  • [34] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [35] A new biometric identity based encryption scheme secure against DoS attacks
    Sarier, Neyire Deniz
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 23 - 32
  • [36] KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
    Liu, Ling
    Zhang, Yuqing
    Li, Xuejun
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (02) : 670 - 681
  • [37] A DNA Encryption Technique Based on Matrix Manipulation and Secure key Generation Scheme
    Mandge, Tushar
    Choudhary, Vijay
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 47 - 52
  • [38] An efficient and provably secure public key encryption scheme based on coding theory
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Xiaohui
    Shen, Xuemin
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (12) : 1440 - 1447
  • [39] Efficient Forward-Secure Threshold Public Key Encryption
    Kurek, Rafael
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 330 - 349
  • [40] Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails
    Wei, Jianghong
    Chen, Xiaofeng
    Wang, Jianfeng
    Hu, Xuexian
    Ma, Jianfeng
    COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 134 - 150