Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
スポンサーリンク
概要
- 論文の詳細を見る
We propose an anonymous Hierarchical Identity-Based Encryption (anonymous HIBE) scheme with short ciphertexts. Prior to our work, most anonymous HIBE schemes have long ciphertexts increased according to the hierarchical depth of recipient. The size of the ciphertext in our scheme does not depend on the depth of the hierarchy. Moreover, our scheme achieves the lowest computational cost because during the decryption phase the computational cost of decryption is constant. The security can be proven under reasonable assumptions without using random oracles. Our scheme achieves selective-ID security notion.
- 2011-01-01
著者
-
Kobayashi Tetsutaro
Ntt Information And Communication Systems Laboratories
-
Suzuki Koutarou
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Seo Jae
Department Of Electronic And Electrical Engineering
-
Seo Jae
Department Of Mathematics And Isac-rim Seoul National University
-
OHKUBO Miyako
National Institute of Information and Communications Technology
-
Ohkubo Miyako
National Inst. Of Information And Communications Technol. Koganei‐shi Jpn
関連論文
- Association study of TP53 polymorphisms with lung cancer in a Korean population
- Lack of association of fragile histidine triad (FHIT) polymorphisms with lung cancer in the Korean population
- Visible Laser Action of Dy^ Ions in Monoclinic KY(WO_4)_2 and KGd(WO_4)_2 Crystals under Xe-Flashlamp Pumping
- Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications(Protocols,Cryptography and Information Security)
- Candidate One-Way Functions on Non-Supersingular Elliptic Curves(Elliptic Curve Cryptography, Cryptography and Information Security)
- Non-Supersingular Elliptic Curves for Pairing-Based Cryptosystems(Discrete Mathematics and Its Applications)
- Generalized Hash Chain Traversal with Selective Output
- Generalized Combinatoric Accumulator
- Generalized Vickrey Auction and Suppression of Active Adversary Using Incentive-Compatible Implementation(Application)(Cryptography and Information Security)
- Risk Factors for Development of Paradoxical Response during Anti-Tuberculosis Treatment in HIV-Negative Patients with Pleural Tuberculosis
- Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
- Structural Optimization of High-Power AlGaInP Resonant Cavity Light-Emitting Diodes for Visible Light Communications
- Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3
- Traceable Ring Signature
- Fast Modular Inversion Algorithm to Match Any Operation Unit (Special Section on Discrete Mathematics and Its Applications)
- Efficient τ-Adic Sliding Window Method on Elliptic Curve Cryptosystems(Special Section on Cryptography and Information Security)
- Energy-Efficient Hash Chain Traversal
- M+1-st Price Auction Using Homomorphic Encryption(Special Section on Cryptography and Information Security)
- Lenient/Strict Batch Verification in Several Groups(Special Section on Cryptography and Information Security)
- A Cyclic Window Algorithm for Elliptic Curves over OEF(Special Section on Cryptography and Information Security)
- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
- Strongly Secure Predicate-Based Authenticated Key Exchange : Definition and Constructions
- Security of ESIGN-PSS(Information Security)
- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
- Relations among Notions of Privacy for RFID Authentication Protocols
- On Discrete Logarithm Based Additively Homomorphic Encryption
- A Remark on " Efficient Revocable ID-Based Encryption with a Public Channel"
- Revocable Identity-Based Encryption with Rejoin Functionality