Anonymous identity-based hash proof system and its applications

  • Authors:
  • Yu Chen;Zongyang Zhang;Dongdai Lin;Zhenfu Cao

  • Affiliations:
  • State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering, CAS, Beijing, China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, China;State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering, CAS, Beijing, China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, China

  • Venue:
  • ProvSec'12 Proceedings of the 6th international conference on Provable Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

We introduce the concept of anonymous identity-based hash proof system (IB-HPS), and show how to use it to construct identity-based encryption schemes providing anonymity in the presence of key leakage. We give four different constructions of anonymous IB-HPS based on: (1) the decision bilinear Diffie-Hellman assumption, (2) the decision truncated augmented bilinear Diffie-Hellman exponent assumption, (3) the quadratic residuosity assumption, and (4) the decision learning with errors assumption.