A variant of Boyen-waters anonymous IBE scheme

  • Authors:
  • Song Luo;Qingni Shen;Yongming Jin;Yu Chen;Zhong Chen;Sihan Qing

  • Affiliations:
  • College of Computer Science and Eng., Chongqing Univ. of Techn., China and Inst. of Software, School of Electronics Eng. and Computer Science, Peking Univ. and Key Lab. of High Confidence Software ...;School of Software and Microelectronics & MoE Key Lab of Network and Software Assurance, Peking University, Beijing, China;Institute of Software, School of Electronics Engineering and Computer Science, Peking University and Key Laboratory of High Confidence Software Technologies, Peking University, Ministry of Educati ...;Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China;Sch. of Software and Microelectronics & MoE Key Lab of Network and Software Assurance, Peking Univ., Beijing, China and Inst. of Software, Sch. of Electronics Eng. and Comp. Science, Peking Un ...;School of Software and Microelectronics & MoE Key Lab of Network and Software Assurance, Peking University, Beijing, China and Institute of Software, Chinese Academy of Sciences, Beijing, Chin ...

  • Venue:
  • ICICS'11 Proceedings of the 13th international conference on Information and communications security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

An identity-based encryption (IBE) scheme is called anonymous if the ciphertext leaks no information about the recipient's identity. In this paper, we present a novel anonymous identity-based encryption scheme. Our scheme comes from the analysis of Boyen-Waters anonymous IBE Scheme in which we find a method to construct anonymous IBE schemes. We show that Boyen-Waters anonymous IBE scheme can be transformed from BB1-IBE scheme. Our scheme is also transformed from BB1-IBE scheme and can be seemed as a variant of Boyen-Waters anonymous IBE scheme. The security proof shows the transformed scheme has the same semantic security as the original scheme and has anonymous security. We prove anonymity under the Decision Linear assumption.