Pairing-based public-key encryption schemes with backward-and-forward security

被引:0
|
作者
Han, Song [1 ]
Chang, Elizabeth [1 ]
Dillon, Tharam [1 ]
机构
[1] Curtin Univ Technol, Curtin Business Sch, DEBI Inst, Perth, WA 6845, Australia
来源
关键词
semantic security; public key encryption; bilinear pairings; backward-and-forward security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based cryptosystems utilize some arbitrary strings as the participants' public key in the underlying system. The encryptioner will not need to obtain the decryptioner's certificate. That will simplify the certificate managernent. Therefore, it is still interesting to propose some new identity-based encryption schemes. In this paper, we will propose two new different constructions, i.e. receiptor-oriented encryption schemes. They are both identity-based encryption schemes and also based on pairings. The proposed encryption schemes have a new advantage, i.e. backward-and-forward security. In addition, we provide the security analysis for the proposed schemes.
引用
收藏
页码:3 / 8
页数:6
相关论文
共 50 条
  • [21] Strong Knowledge Extractors for Public-Key Encryption Schemes
    Barbosa, Manuel
    Farshim, Pooya
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 164 - +
  • [22] Security analysis of public-key watermarking schemes
    Craver, S
    Katzenbeisser, S
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION IV, WITH APPLICATIONS, 2001, 4475 : 172 - 182
  • [23] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [24] A Forward-Secure Public-Key Encryption Scheme
    Ran Canetti
    Shai Halevi
    Jonathan Katz
    Journal of Cryptology, 2007, 20 : 265 - 294
  • [25] A forward-secure public-key encryption scheme
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 265 - 294
  • [26] New security notions and relations for public-key encryption
    Sepahi, Reza
    Pieprzyk, Josef
    Shahandashti, Siamak F.
    Schoenmakers, Berry
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2012, 6 (3-4) : 183 - 227
  • [27] Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions
    Pereira, Mayana
    Dowsley, Rafael
    Nascimento, Anderson C. A.
    Hanaoka, Goichiro
    COMPUTER JOURNAL, 2015, 58 (10): : 2738 - 2746
  • [28] Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions
    Dowsley, Rafael (rafael.dowsley@kit.edu), 1600, Oxford University Press (58):
  • [29] PUBLIC-KEY ENCRYPTION
    STUBBS, E
    EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1984, 29 (04): : 29 - 29
  • [30] Combined schemes for signature and encryption: The public-key and the identity-based setting
    Gonzalez Vasco, Maria Isabel
    Hess, Florian
    Steinwandt, Rainer
    INFORMATION AND COMPUTATION, 2016, 247 : 1 - 10