Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Anonymous HIBE with short ciphertexts: full security in prime order groups

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Kwangsu-
dc.contributor.authorPark, Jong Hwan-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-04T19:34:10Z-
dc.date.available2021-09-04T19:34:10Z-
dc.date.created2021-06-15-
dc.date.issued2015-02-
dc.identifier.issn0925-1022-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/94490-
dc.description.abstractAnonymous hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE), and it provides not only a message hiding property but also an identity hiding property. Anonymous HIBE schemes can be applicable to anonymous communication systems and public key encryption systems with keyword searching. However, previous anonymous HIBE schemes have some disadvantages that the security was proven in the weaker model, the size of ciphertexts is not short, or the construction was based on composite order bilinear groups. In this paper, we propose the first efficient anonymous HIBE scheme with short ciphertexts in prime order (asymmetric) bilinear groups, and prove its security in the full model with an efficient reduction. To achieve this, we use the dual system encryption methodology of Waters. We also present the benchmark results of our scheme by measuring the performance of our implementation.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.subjectIDENTITY-BASED ENCRYPTION-
dc.subjectDUAL SYSTEM ENCRYPTION-
dc.subjectPUBLIC-KEY ENCRYPTION-
dc.subjectPREDICATE ENCRYPTION-
dc.subjectBROADCAST ENCRYPTION-
dc.subjectIBE-
dc.titleAnonymous HIBE with short ciphertexts: full security in prime order groups-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Kwangsu-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1007/s10623-013-9868-6-
dc.identifier.scopusid2-s2.0-84922002010-
dc.identifier.wosid000348340600007-
dc.identifier.bibliographicCitationDESIGNS CODES AND CRYPTOGRAPHY, v.74, no.2, pp.395 - 425-
dc.relation.isPartOfDESIGNS CODES AND CRYPTOGRAPHY-
dc.citation.titleDESIGNS CODES AND CRYPTOGRAPHY-
dc.citation.volume74-
dc.citation.number2-
dc.citation.startPage395-
dc.citation.endPage425-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryMathematics, Applied-
dc.subject.keywordPlusIDENTITY-BASED ENCRYPTION-
dc.subject.keywordPlusDUAL SYSTEM ENCRYPTION-
dc.subject.keywordPlusPUBLIC-KEY ENCRYPTION-
dc.subject.keywordPlusPREDICATE ENCRYPTION-
dc.subject.keywordPlusBROADCAST ENCRYPTION-
dc.subject.keywordPlusIBE-
dc.subject.keywordAuthorIdentity-based encryption-
dc.subject.keywordAuthorHierarchical identity-based encryption-
dc.subject.keywordAuthorAnonymity-
dc.subject.keywordAuthorFull model security-
dc.subject.keywordAuthorBilinear maps-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE