ID-Based Ring Authenticated Encryption

  • Authors:
  • Tianjie Cao;Dongdai Lin;Rui Xue

  • Affiliations:
  • Chinese Academy of Sciences and China University of Mining and Technology;Chinese Academy of Sciences;Chinese Academy of Sciences

  • Venue:
  • AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
  • Year:
  • 2005

Quantified Score

Hi-index 0.01

Visualization

Abstract

Ring authenticated encryption has the following security requirements: semantic-security, recipient-designation, verification-dependence, verification-convertibility, recipient-ambiguity, recipient-verifiability, signer-ambiguity and signer-verifiability. Ring authenticated encryption can be used to enhance user privacy. In this paper, based on Boneh and Franklinyýs ID-based encryption scheme and Zhang and Kimýs ID-based ring signature scheme, we propose an ID-based ring authenticated encryption scheme. We also show that the proposed scheme satisfies the correctness property and all security requirements.