Abstract
Identity based (ID-based) key encapsulation mechanism (KEM) is used to encapsulate a symmetric key during the construction of hybrid encryption in the identity based setting. In many situations, the receiver does not want to reveal identity information. So anonymous multi-receiver KEM is needed to solve the problem. In this paper, we present the first ID-based anonymous multi-receiver KEM with sender authentication. We formulate its security model and define the security notions. We present an concrete construction from pairings and the construction is provably secure in the random oracle model.
This work is supported by a Project of Shandong Province Higher Educational Science and Technology Program under Grant No.J13LN21.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bellare, M., Boldyreva, A., Micali, S.: Public-key Encryption in a Multi-user Setting: Security Proofs and Improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259–274. Springer, Heidelberg (2000)
Fan, C.I., Huang, L.Y., Ho, P.H.: Anonymous Multireceiver Identity-based Encryption. IEEE T. Comput. 9, 1239–1249 (2010)
Chien, H.Y.: Improved Anonymous Multi-receiver Identity-based Encryption. The Comput. J. 4, 439–446 (2012)
Hur, J., Park, C., Hwang, S.O.: Privacy-preserving Identity-based Broadcast Encryption. Inform. Fusion. 4, 296–303 (2012)
Tseng, Y.M., Huang, Y.H., Chang, H.J.: Privacy-preserving Multireceiver ID-based Encryption with Provable Security. Int. J. Commun. Syst., 12 (2012), doi:10.1002/dac.2395 (Online Version)
Shoup, V.: A Proposal for an ISO Standard for Public Key Encryption (version 2.1), http://shoup.net/papers
Cramer, R., Shoup, V.: Design and Analysis of Practical Public-key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack. SIAM J. Comput. 1, 167–226 (2003)
Cha, J.C., Cheon, J.H.: An identity-based Signature from Gap Diffie-Hellman Groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)
David, P., Jacques, S.: Security Arguments for Digital Signatures and Blind Signatures. J. Cryptol. 3, 361–396 (2000)
Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhang, B., Sun, T., Yu, D. (2014). ID-Based Anonymous Multi-receiver Key Encapsulation Mechanism with Sender Authentication. In: Sun, Xh., et al. Algorithms and Architectures for Parallel Processing. ICA3PP 2014. Lecture Notes in Computer Science, vol 8631. Springer, Cham. https://doi.org/10.1007/978-3-319-11194-0_57
Download citation
DOI: https://doi.org/10.1007/978-3-319-11194-0_57
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11193-3
Online ISBN: 978-3-319-11194-0
eBook Packages: Computer ScienceComputer Science (R0)