Pairing-based public-key encryption schemes with backward-and-forward security

被引:0
|
作者
Han, Song [1 ]
Chang, Elizabeth [1 ]
Dillon, Tharam [1 ]
机构
[1] Curtin Univ Technol, Curtin Business Sch, DEBI Inst, Perth, WA 6845, Australia
来源
关键词
semantic security; public key encryption; bilinear pairings; backward-and-forward security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based cryptosystems utilize some arbitrary strings as the participants' public key in the underlying system. The encryptioner will not need to obtain the decryptioner's certificate. That will simplify the certificate managernent. Therefore, it is still interesting to propose some new identity-based encryption schemes. In this paper, we will propose two new different constructions, i.e. receiptor-oriented encryption schemes. They are both identity-based encryption schemes and also based on pairings. The proposed encryption schemes have a new advantage, i.e. backward-and-forward security. In addition, we provide the security analysis for the proposed schemes.
引用
收藏
页码:3 / 8
页数:6
相关论文
共 50 条
  • [31] Further analysis of pairing-based traitor tracing schemes for broadcast encryption
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 28 - 32
  • [32] Provably secure public-key encryption schemes: EPOC and PSEC
    Okamoto, Tatsuaki
    Fujisaki, Eiichiro
    Uchiyama, Shigenori
    NTT R and D, 1999, 48 (10): : 740 - 749
  • [33] Pairing-free public-key authenticated encryption with keyword search
    Bai, Lisha
    Yong, Lei
    Chen, Zhixian
    Shao, Jun
    COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [34] A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks
    Chen, Biwen
    Wu, Libing
    Wang, Huaqun
    Zhou, Lu
    He, Debiao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 5813 - 5825
  • [35] Public-Key Encryption Based on Chebyshev Polynomials
    L. Kocarev
    J. Makraduli
    P. Amato
    Circuits, Systems and Signal Processing, 2005, 24 : 497 - 517
  • [36] Public-key encryption based on Chebyshev polynomials
    Kocarev, L
    Makraduli, J
    Amato, P
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2005, 24 (05) : 497 - 517
  • [37] Public-key encryption based on Chebyshev maps
    Kocarev, L
    Tasev, Z
    PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III: GENERAL & NONLINEAR CIRCUITS AND SYSTEMS, 2003, : 28 - 31
  • [38] Security-enhanced public-key authenticated searchable encryption
    Cheng, Leixiao
    Qin, Jing
    Feng, Feng
    Meng, Fei
    INFORMATION SCIENCES, 2023, 647
  • [39] How to enhance the security of public-key encryption at minimum cost
    Fujisaki, E
    Okamoto, T
    PUBLIC KEY CRYPTOGRAPHY, 1999, 1560 : 53 - 68
  • [40] Selectively chosen ciphertext security in threshold public-key encryption
    Kim, Kitak
    Park, Jong Hwan
    Lee, Dong Hoon
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (03) : 189 - 200