Efficient dynamic threshold identity-based encryption with constant-size ciphertext

被引:4
|
作者
Susilo, Willy [1 ]
Guo, Fuchun [1 ]
Mu, Yi [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2500, Australia
关键词
Threshold identity-based encryption; Dynamic; Constant-size; PUBLIC-KEY ENCRYPTION; ADAPTIVE SECURITY;
D O I
10.1016/j.tcs.2015.09.006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper revisits the notion of dynamic threshold identity-based encryption, due to the recent practical interest. In this notion, an encryptor selects n recipients and a threshold value t for the creation of the ciphertext. The plaintext can only be recovered if at least t receivers cooperate. The key issue in this notion is its dynamicity, where after the users enroll to the system, the sender can dynamically select the set of recipients as well as dynamically set the threshold t upon the creation of the ciphertext. Another essential feature of this notion is the need for a constant-size ciphertext. Interestingly, the work by Delerablee and Pointcheval in Crypto 2008 is the only work that achieves this essential feature. In this work, we propose a new scheme achieving all of these nice properties with significant improvements in terms of the computational efficiency (both the encryption and decryption). In our scheme, there is no need to conduct any encryption and decryption using additional dummy users, which are not part of the recipient group, which is in contrast to Delerablee and Pointcheval's work. This improvement has significantly reduced the amount of computations required in both encryption and decryption algorithms. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:49 / 59
页数:11
相关论文
共 50 条
  • [41] Revocable identity-based encryption with server-aided ciphertext evolution
    Sun, Yinxia
    Mu, Yi
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    THEORETICAL COMPUTER SCIENCE, 2020, 815 : 11 - 24
  • [42] Expressive attribute-based keyword search with constant-size ciphertext
    Jinguang Han
    Ye Yang
    Joseph K. Liu
    Jiguo Li
    Kaitai Liang
    Jian Shen
    Soft Computing, 2018, 22 : 5163 - 5177
  • [43] New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
    Luo, Song
    Chen, Yu
    Hu, Jianbin
    Chen, Zhong
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 55 - 70
  • [44] Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys
    Zhang, Leyou
    Mu, Yi
    Wu, Qing
    COMPUTER JOURNAL, 2016, 59 (04): : 452 - 461
  • [45] Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities
    Chiku, Sohto
    Hara, Keisuke
    Shikata, Junji
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 299 - 314
  • [46] Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model
    孙瑾
    胡予濮
    张乐友
    JournalofShanghaiJiaotongUniversity(Science), 2011, 16 (06) : 672 - 676
  • [47] Chosen ciphertext secure identity-based broadcast encryption in the standard model
    Sun J.
    Hu Y.-P.
    Zhang L.-Y.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (06) : 672 - 676
  • [48] Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
    He, Kai
    Weng, Jian
    Liu, Jia-Nan
    Liu, Joseph K.
    Liu, Wei
    Deng, Robert H.
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 247 - 255
  • [49] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Han, Shuai
    Liu, Shengli
    Qin, Baodong
    Gu, Dawu
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (03) : 517 - 554
  • [50] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Shuai Han
    Shengli Liu
    Baodong Qin
    Dawu Gu
    Designs, Codes and Cryptography, 2018, 86 : 517 - 554