PANG Liaojun, GAO Lu, PEI Qingqi, et al., “A New ID-based Multi-Recipient Public-key Encryption Scheme,” Chinese Journal of Electronics, vol. 22, no. 1, pp. 89-92, 2013,
Citation: PANG Liaojun, GAO Lu, PEI Qingqi, et al., “A New ID-based Multi-Recipient Public-key Encryption Scheme,” Chinese Journal of Electronics, vol. 22, no. 1, pp. 89-92, 2013,

A New ID-based Multi-Recipient Public-key Encryption Scheme

Funds:  This work is supported by the National Natural Science Foundation of China (No.60803151, No.61103178).
  • Received Date: 2011-01-01
  • Rev Recd Date: 2012-09-01
  • Publish Date: 2013-01-05
  • Multi-recipient public-key encryption can be used to solve the security issue of One-To-Many communications such as secure broadcast. In a multi-recipient public-key encryption scheme, a ciphertext generated by the sender with its private key can be decrypted correctly by each recipient with its own private key. To solve the key negotiation problem between the sender and each recipient, the ID-based multi-recipient encryption has been proposed recently. Baek et al. proposed a general method to design an ID-based multi-recipient public-key encryption scheme with the IND-CCA2 security by using REACT, and at the same time, they proposed an excellent scheme. However, analyses show that there are still some flaws in their scheme, such as exposing recipient identity and unfair encryption. Motivated by these concerns, we propose a new ID-based multi-recipient public-key encryption scheme based on the same design method. Analyses show that our proposal can overcome all the flaws in Baek et al.’s scheme and is more practical in applications.
  • loading
  • M. Bellare, A. Boldyreva, S. Micali, “Public-key encryption in amulti-user setting: security proofs and improvements”, Proc. ofthe International Conference on the Theory and Application ofCryptographic Techniques, Bruges, Belgium, pp.259-274, 2000.
    O. Baudron, D. Pointcheval, J. Stern, “Extended notions of securityfor multicast public key cryptosystems”, Proc. of the Automata,Languages and Programming 27th International Colloquium,Geneva, Switzerland, pp.499-511, 2000.
    L. Lu, L. Hu, “Multi-recipient public key encryption schemebased on Weil Pairing”, Journal of Software, Vol.19, No.8,pp.2159-2166, 2008.
    L. Pang, H. Li, L. Jiao, Y. Wang, “Design and analysis of aprovable secure multi-recipient public key encryption scheme”,Journal of Software, Vol.20, No.10, pp.2907-2914, 2009.
    H. Cheng, C. Rong, Z. Tan, Q. Zeng, “Identity based encryptionand biometric authentication scheme for secure data accessin cloud computing”, Chinese Journal of Electronics, Vol.21,No.2, pp.154-259, 2012.
    H. Qin, Y. Dai, Z. Wang, “Identity-based multi-receiver thresholdsigncryption scheme”, Security and Communication Networks,Vol.4, No.11, pp.1331-1337, 2011.
    C.I. Fan, L.Y. Huang, P.H. Ho, “Anonymous multireceiveridentity-based encryption”, IEEE Transactions on Computers,Vol.59, No.9, pp.1239-1249, 2010.
    B. Zhang, Q. Xu, “An ID-based anonymous signcryption schemefor multiple receivers secure in the standard model”, Proc. ofthe Advances in Computer Science and Information Technology,Miyazaki, Japan, pp.15-27, 2010.
    L. Pang, H. Li, Q. Pei, “Improved multicast key managementof Chinese wireless local area network security standard”, IETCommunications, Vol.6, No.9, pp.1126-1130, 2012.
    J. Baek, S.N. Reihaneh, W. Susilo, “Efficient multi-receiveridentity-based encryption and its application to broadcast encryption”,Proc. of the 8th International Workshop on Theoryand Practice in Public Key Cryptography, Les Diablerets,Switzerland, pp.380-397, 2005.
    T. Okamoto, D. Pointcheval, “REACT: Rapid enhancedsecurityasymmetric cryptosystem transform”, Proc. of Topicsin Cryptology at RSA Conference, San Francisco, CA, USA,pp.159-174, 2001.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (719) PDF downloads(1430) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return