Identity-based authenticated encryption with identity confidentiality

Author(s):  
Shiyu Shen ◽  
Hongbing Wang ◽  
Yunlei Zhao
Symmetry ◽  
2015 ◽  
Vol 7 (4) ◽  
pp. 1856-1881 ◽  
Author(s):  
Chun-I Fan ◽  
Yi-Fan Tseng

2019 ◽  
Vol 481 ◽  
pp. 330-343 ◽  
Author(s):  
Hongbo Li ◽  
Qiong Huang ◽  
Jian Shen ◽  
Guomin Yang ◽  
Willy Susilo

2011 ◽  
Vol 22 (03) ◽  
pp. 739-756 ◽  
Author(s):  
HAN-YU LIN ◽  
CHIEN-LUNG HSU

For securing confidential applications such as credit card transactions, on-line auctions and business contract signing, etc., a convertible authenticated encryption (CAE) scheme simultaneously satisfying the properties of authenticity, confidentiality and non-repudiation is a better choice. By combining the advantages of identity-based systems and key-insulated ones, in this paper, we propose the first novel identity-based key-insulated CAE (IB-KICAE) scheme from pairings. Integrating with key-insulated systems, our scheme can effectively mitigate the impact caused by key exposure, as each user can periodically update his private key while the corresponding public one remains unchanged. The proposed scheme is conversion-free and supports unbounded time periods and random-access key-updates. Moreover, to guarantee its practical feasibility, the essential security requirement of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) and that of unforgeability against existential forgery under adaptive chosen-message attacks (EF-CMA) are realized in the random oracle model.


2015 ◽  
Vol 62 (4) ◽  
pp. 625-639 ◽  
Author(s):  
Fagen Li ◽  
Zhaohui Zheng ◽  
Chunhua Jin

PLoS ONE ◽  
2021 ◽  
Vol 16 (1) ◽  
pp. e0244978
Author(s):  
Chunhua Jin ◽  
Ge Kan ◽  
Guanhua Chen ◽  
Changhui Yu ◽  
Ying Jin ◽  
...  

The location-based services can provide users with the requested location information. But users also need to disclose their current location to the location-based service provider. Therefore, how to protect user’s location privacy is a major concern. In this paper, we propose a heterogeneous deniable authenticated encryption scheme called HDAE for location-based services. The proposed scheme permits a sender in a public key infrastructure environment to transmit a message to a receiver in an identity-based environment. Our design utilizes a hybrid encryption method combing the tag-key encapsulation mechanism (tag-KEM) and the data encapsulation mechanism (DEM), which is well adopted for location-based services applications. We give how to design an HDAE scheme utilizing a heterogeneous deniable authenticated tag-KEM (HDATK) and a DEM. We also construct an HDATK scheme and provide security proof in the random oracle model. Comprehensive analysis shows that our scheme is efficient and secure. In addition, we give an application of the HDAE to a location-based services system.


Sign in / Sign up

Export Citation Format

Share Document