A Verifiable Multi-Recipient Encryption Scheme from Multilinear Maps

被引:1
|
作者
Jing, Zhengjun [1 ]
Jiang, Guoping [1 ]
Gu, Chunsheng [2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing, Jiangsu, Peoples R China
[2] Jiangsu Univ Technol, Dept Comp Engn, Changzhou, Peoples R China
关键词
public key encryption; multi-recipient verifiable; multilinear maps; SECURITY;
D O I
10.1109/3PGCIC.2014.49
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-recipient encryption is an important public key cryptosystem, which can be applied for a variety of purposes, such as broadcasting data. In order to design an secure multi-recipient public key encryption (MRPKE) in post-quantum era, in this paper, we construct a novel MRPKE scheme base on Garg-Gentry-Halevi (GGH) framework which is a graded algebras analogue of multilinear maps from ideal lattice. Under the grade decisional Diffie-Hellman (GDDH) assumption of GGH, the proposed scheme has semantically safety against chosen plaintext attack (CPA). At the same time, each recipient, without first decrypting, can verify whether the message to be received is from a legitimate sender. Furthermore, the encryption and decryption only involves the polynomial modular addition and multiplication in polynomial ring, so the efficiency of the proposed scheme is higher.
引用
收藏
页码:151 / 156
页数:6
相关论文
共 50 条
  • [1] Multi-Recipient Certificate-Based Searchable Encryption Scheme
    Liu H.
    Ming Y.
    Wang C.-H.
    Zhao Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 544 - 557
  • [2] Multi-recipient public key encryption scheme based on Weil Pairing
    Lu, Li
    Hu, Lei
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (08): : 2159 - 2166
  • [3] A new ID-based multi-recipient public-key encryption scheme
    Pang, L. (ljpang@mail.xidian.edu.cn), 1600, Chinese Institute of Electronics (22):
  • [4] A New ID-based Multi-Recipient Public-key Encryption Scheme
    Pang Liaojun
    Gao Lu
    Pei Qingqi
    Gui Jingjing
    Wang Yumin
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01): : 89 - 92
  • [5] MULTI-RECIPIENT AND THRESHOLD ENCRYPTION BASED ON HIDDEN MULTIPLIERS
    Roman'kov, Vitaly
    GROUPS COMPLEXITY CRYPTOLOGY, 2022, 14 (02) : 1 - 12
  • [6] Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
    Li, Jing
    Tang, Xiangyan
    Wei, Zhijun
    Wang, Yu
    Chen, Wenbin
    Tan, Yu-an
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1543 - 1550
  • [7] Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
    Jing Li
    Xiangyan Tang
    Zhijun Wei
    Yu Wang
    Wenbin Chen
    Yu-an Tan
    Mobile Networks and Applications, 2021, 26 : 1543 - 1550
  • [8] Multi-recipient Public-Key Encryption from Simulators in Security Proofs
    Hiwatari, Harunaga
    Tanaka, Keisuke
    Asano, Tomoyuki
    Sakumoto, Koichi
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 293 - +
  • [9] Post-Quantum Multi-Recipient Public Key Encryption
    Alwen, Joel
    Hartmann, Dominik
    Kiltz, Eike
    Mularczyk, Marta
    Schwabe, Peter
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1108 - 1122
  • [10] A MULTI-RECIPIENT TREE-BASED SIGNCRYPTION SCHEME
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2007, : 69 - 72