Conditions for anonymity in some generic public-key encryption constructions

In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by anothe...

Full description

Saved in:
Bibliographic Details
Main Authors: TIAN Yuan, DENG Lu-yao, ZHANG Hao
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74649440/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537673231073280
author TIAN Yuan
DENG Lu-yao
ZHANG Hao
author_facet TIAN Yuan
DENG Lu-yao
ZHANG Hao
author_sort TIAN Yuan
collection DOAJ
description In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.
format Article
id doaj-art-156759129ad34419937885e025d14184
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-156759129ad34419937885e025d141842025-01-14T08:27:05ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-013081674649440Conditions for anonymity in some generic public-key encryption constructionsTIAN YuanDENG Lu-yaoZHANG HaoIn applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.http://www.joconline.com.cn/zh/article/74649440/computational cryptographyanonymityprovable securityidentity-based encryption schemekey-privacy
spellingShingle TIAN Yuan
DENG Lu-yao
ZHANG Hao
Conditions for anonymity in some generic public-key encryption constructions
Tongxin xuebao
computational cryptography
anonymity
provable security
identity-based encryption scheme
key-privacy
title Conditions for anonymity in some generic public-key encryption constructions
title_full Conditions for anonymity in some generic public-key encryption constructions
title_fullStr Conditions for anonymity in some generic public-key encryption constructions
title_full_unstemmed Conditions for anonymity in some generic public-key encryption constructions
title_short Conditions for anonymity in some generic public-key encryption constructions
title_sort conditions for anonymity in some generic public key encryption constructions
topic computational cryptography
anonymity
provable security
identity-based encryption scheme
key-privacy
url http://www.joconline.com.cn/zh/article/74649440/
work_keys_str_mv AT tianyuan conditionsforanonymityinsomegenericpublickeyencryptionconstructions
AT dengluyao conditionsforanonymityinsomegenericpublickeyencryptionconstructions
AT zhanghao conditionsforanonymityinsomegenericpublickeyencryptionconstructions