okamoto transformation
Recently Published Documents


TOTAL DOCUMENTS

6
(FIVE YEARS 1)

H-INDEX

2
(FIVE YEARS 0)

Author(s):  
Nir Drucker ◽  
Shay Gueron ◽  
Dusan Kostic ◽  
Edoardo Persichetti


2019 ◽  
Vol 30 (04) ◽  
pp. 493-509
Author(s):  
Yi-Fan Tseng ◽  
Chun-I Fan ◽  
Cheng-Wei Sung

In 2010, Fan et al. first introduced the concept of anonymous multi-receiver identity-based encryption (AMRIBE). They used the concept of Fujisaki–Okamoto transformation (F.O. transformation) to support their proof in random oracle models. Recently, many works on this topic have been proposed. Most of them adopted Fujisaki–Okamoto transformation to achieve the indistinguishability of encryptions under multi-ID, chosen-ciphertext attacks (IND-MID-CCA) security. However, we find out that these schemes do not gain anonymity against insider attacks. In this manuscript, we use a sequence of games to prove that any AMRIBE scheme will fail to gain anonymity under chosen-ciphertext attacks and chosen-plaintext attacks if the IND-MID-CCA security is proven using Fujisaki–Okamoto transformation.



2019 ◽  
Vol 20 (4) ◽  
pp. 1121-1148
Author(s):  
Vladimir Dragović ◽  
Vasilisa Shramchenko


Author(s):  
Dennis Hofheinz ◽  
Kathrin Hövelmanns ◽  
Eike Kiltz


Sign in / Sign up

Export Citation Format

Share Document