Pairing-based public-key encryption schemes with backward-and-forward security

被引:0
|
作者
Han, Song [1 ]
Chang, Elizabeth [1 ]
Dillon, Tharam [1 ]
机构
[1] Curtin Univ Technol, Curtin Business Sch, DEBI Inst, Perth, WA 6845, Australia
来源
关键词
semantic security; public key encryption; bilinear pairings; backward-and-forward security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based cryptosystems utilize some arbitrary strings as the participants' public key in the underlying system. The encryptioner will not need to obtain the decryptioner's certificate. That will simplify the certificate managernent. Therefore, it is still interesting to propose some new identity-based encryption schemes. In this paper, we will propose two new different constructions, i.e. receiptor-oriented encryption schemes. They are both identity-based encryption schemes and also based on pairings. The proposed encryption schemes have a new advantage, i.e. backward-and-forward security. In addition, we provide the security analysis for the proposed schemes.
引用
收藏
页码:3 / 8
页数:6
相关论文
共 50 条
  • [41] Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
    Qin, Bo
    Wu, Qianhong
    Zhang, Lei
    Domingo-Ferrer, Josep
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 62 - 76
  • [42] How to enhance the security of public-key encryption at minimum cost
    Fujisaki, E
    Okamoto, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (01) : 24 - 32
  • [43] Deniable Encryption Protocols Based on Probabilistic Public-Key Encryption
    Moldovyan, Nikolay
    Berezin, Andrey
    Kornienko, Anatoly
    Moldovyan, Alexander
    PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 284 - 289
  • [44] Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications
    Xu, Shiyuan
    Cao, Yibo
    Chen, Xue
    Zhao, Yanmin
    Yiu, Siu-Ming
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 274 - 298
  • [45] SYMMETRICAL PUBLIC-KEY ENCRYPTION
    GALIL, Z
    HABER, S
    YUNG, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 128 - 137
  • [46] Human Public-Key Encryption
    Ferradi, Houda
    Geraud, Remi
    Naccache, David
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 494 - 505
  • [47] Public-key encryption with chaos
    Kocarev, L
    Sterjev, M
    Fekete, A
    Vattay, G
    CHAOS, 2004, 14 (04) : 1078 - 1082
  • [48] LUC - PUBLIC-KEY ENCRYPTION
    SMITH, P
    DR DOBBS JOURNAL, 1993, 18 (01): : 44 - &
  • [49] Multipurpose Public-Key Encryption
    Zhang, Rui
    He, Kai
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 69 - 84
  • [50] Forward-secure Public-Key Encryption Scheme with Tamper Evidence
    Jiang Han
    Xu QiuLiang
    Hou MengBo
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 656 - 659