Anonymous HIBE with short ciphertexts: full security in prime order groups
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Kwangsu | - |
dc.contributor.author | Park, Jong Hwan | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-04T19:34:10Z | - |
dc.date.available | 2021-09-04T19:34:10Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2015-02 | - |
dc.identifier.issn | 0925-1022 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/94490 | - |
dc.description.abstract | Anonymous hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE), and it provides not only a message hiding property but also an identity hiding property. Anonymous HIBE schemes can be applicable to anonymous communication systems and public key encryption systems with keyword searching. However, previous anonymous HIBE schemes have some disadvantages that the security was proven in the weaker model, the size of ciphertexts is not short, or the construction was based on composite order bilinear groups. In this paper, we propose the first efficient anonymous HIBE scheme with short ciphertexts in prime order (asymmetric) bilinear groups, and prove its security in the full model with an efficient reduction. To achieve this, we use the dual system encryption methodology of Waters. We also present the benchmark results of our scheme by measuring the performance of our implementation. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | IDENTITY-BASED ENCRYPTION | - |
dc.subject | DUAL SYSTEM ENCRYPTION | - |
dc.subject | PUBLIC-KEY ENCRYPTION | - |
dc.subject | PREDICATE ENCRYPTION | - |
dc.subject | BROADCAST ENCRYPTION | - |
dc.subject | IBE | - |
dc.title | Anonymous HIBE with short ciphertexts: full security in prime order groups | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Kwangsu | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1007/s10623-013-9868-6 | - |
dc.identifier.scopusid | 2-s2.0-84922002010 | - |
dc.identifier.wosid | 000348340600007 | - |
dc.identifier.bibliographicCitation | DESIGNS CODES AND CRYPTOGRAPHY, v.74, no.2, pp.395 - 425 | - |
dc.relation.isPartOf | DESIGNS CODES AND CRYPTOGRAPHY | - |
dc.citation.title | DESIGNS CODES AND CRYPTOGRAPHY | - |
dc.citation.volume | 74 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 395 | - |
dc.citation.endPage | 425 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Mathematics | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Mathematics, Applied | - |
dc.subject.keywordPlus | IDENTITY-BASED ENCRYPTION | - |
dc.subject.keywordPlus | DUAL SYSTEM ENCRYPTION | - |
dc.subject.keywordPlus | PUBLIC-KEY ENCRYPTION | - |
dc.subject.keywordPlus | PREDICATE ENCRYPTION | - |
dc.subject.keywordPlus | BROADCAST ENCRYPTION | - |
dc.subject.keywordPlus | IBE | - |
dc.subject.keywordAuthor | Identity-based encryption | - |
dc.subject.keywordAuthor | Hierarchical identity-based encryption | - |
dc.subject.keywordAuthor | Anonymity | - |
dc.subject.keywordAuthor | Full model security | - |
dc.subject.keywordAuthor | Bilinear maps | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.