Efficient certificate-based encryption schemes without pairing
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Le, Minh-Ha | - |
dc.contributor.author | Kim, Intae | - |
dc.contributor.author | Hwang, Seong Oun | - |
dc.date.available | 2020-07-10T05:42:32Z | - |
dc.date.created | 2020-07-06 | - |
dc.date.issued | 2016-12 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/7090 | - |
dc.description.abstract | Recently, a lot of researches focused on identity-based encryption (IBE). The advantage of this scheme is that it can reduce the cost of the public key infrastructure by simplifying certificate management. Although IBE has its own innovations, one of its weaknesses is the key escrow problem. That is, the private key generator in IBE knows decryption keys for all identities and consequently can decrypt any ciphertexts. The certificate-based encryption (CBE) scheme proposed in EUROCRYPT 2003 provides a solution for the key escrow problem by allowing the certification authority to possess a partial decryption key that comprises the full decryption key together with the user-generated private key. In this paper, we propose new CBE schemes without pairing and prove them to be Indistinguishability under Chosen Ciphertext Attack secure in the random oracle model based on the hardness of the computational Diffie-Hellman problem. When compared with other CBE schemes, our schemes are significantly efficient in terms of performance, which makes our schemes suitable for computation-limited node (e.g., sensor, wearable device) networks. Copyright (c) 2016 John Wiley & Sons, Ltd. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | WILEY-HINDAWI | - |
dc.subject | BROADCAST ENCRYPTION | - |
dc.subject | SECURE | - |
dc.title | Efficient certificate-based encryption schemes without pairing | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hwang, Seong Oun | - |
dc.identifier.doi | 10.1002/sec.1703 | - |
dc.identifier.scopusid | 2-s2.0-85006375372 | - |
dc.identifier.wosid | 000398221800040 | - |
dc.identifier.bibliographicCitation | SECURITY AND COMMUNICATION NETWORKS, v.9, no.18, pp.5376 - 5391 | - |
dc.relation.isPartOf | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.title | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.volume | 9 | - |
dc.citation.number | 18 | - |
dc.citation.startPage | 5376 | - |
dc.citation.endPage | 5391 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | BROADCAST ENCRYPTION | - |
dc.subject.keywordPlus | SECURE | - |
dc.subject.keywordAuthor | cryptography | - |
dc.subject.keywordAuthor | certificate-based encryption | - |
dc.subject.keywordAuthor | identity-based encryption | - |
dc.subject.keywordAuthor | pairing | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.