An Improved Identity-Based Encryption Scheme without Bilinear Map

被引:3
|
作者
Zheng, Minghui [1 ]
Zhou, Huihua [1 ]
Cui, Guohua [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp Sci, Wuhan 430074, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS | 2009年
关键词
Cryptography; Identity-Based Encryption; MOV reduction; bilinear map;
D O I
10.1109/MINES.2009.171
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
According to the MOV reduction theory, the Identity-Based Encryption (IBE) scheme basing on the bilinear map will lose the high efficiency of elliptic curve. So it is meaningful to build the provably secure Identity-based encryption scheme, but which is without the bilinear map. In this paper, based on this existing result and our new research, an improved IBE scheme will be proposed. But it is different from previous scheme that the new scheme is without symmetric encryption, and at the same time having strong provable security. At last, we will analyze the performance of this new scheme.
引用
收藏
页码:374 / 377
页数:4
相关论文
共 50 条
  • [41] CCA-Secure Deterministic Identity-Based Encryption Scheme
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Liang, Kaitai
    Xue, Liang
    Yang, Xiaoyi
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 245 - 269
  • [42] A Novel Hierarchical Identity-Based Encryption Scheme from Lattices
    Ye, Qing
    Hu, Mingxing
    Gao, Wei
    Tang, Yongli
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 412 - 422
  • [43] Hierarchial Identity-Based Encryption Scheme from Multilinear Maps
    Wang, Hao
    Zheng, Zhihua
    Wu, Lei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 455 - 458
  • [44] Anonymous identity-based encryption scheme in groups of prime order
    Ren, Yan-Li
    Zhang, Xin-Peng
    Qian, Zhen-Xing
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2013, 36 (05): : 96 - 98
  • [45] Hierarchical Identity-based Broadcast Encryption Scheme from LWE
    Yang, Chunli
    Zheng, Shihui
    Wang, Licheng
    Lu, Xiuhua
    Yang, Yixian
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2014, 16 (03) : 258 - 263
  • [46] Identity-based Searchable Encryption Scheme for Encrypted Email System
    Niu Shufen
    Xie Yaya
    Yang Pingping
    Wang Caifen
    Du Xiaoni
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (07) : 1803 - 1810
  • [47] Novel hierarchical identity-based encryption scheme from lattice
    Ye Q.
    Hu M.-X.
    Tang Y.-L.
    Liu K.
    Yan X.-X.
    Tongxin Xuebao/Journal on Communications, 2017, 38 (11): : 54 - 64
  • [48] Revocable Identity-Based Encryption Scheme with Leakage-Resilience
    Zhou Y.-W.
    Yang B.
    Xia Z.
    Lai Q.-Q.
    Zhang M.-W.
    Mu Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (08): : 1534 - 1554
  • [49] Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement
    Liao, Yongjian
    Fan, Yu
    Liang, Yikuan
    Liu, Yulu
    Mohammed, Ramadan
    IEEE ACCESS, 2019, 7 : 75067 - 75072
  • [50] Identity-Based Online/Offline Encryption Scheme from LWE
    Zuo, Binger
    Li, Jiguo
    Zhang, Yichen
    Shen, Jian
    INFORMATION, 2024, 15 (09)