ID-based key-insulated signcryption with equality test in cloud computing

作者: Daniel Adu-Gyamfi , Michael Asante , Seth Alornyo , Kingsford Kissi Mireku , Mustapha Adamu Mohammed

DOI: 10.1007/S42452-021-04469-9

关键词:

摘要: Key-insulated encryption reduces the problem of secret key exposure in hostile setting while signcryption cryptosystem attains benefits digitally signing a ciphertext and public cryptosystem. In this study, we merge primitives parallel key-insulation with equality test to construct ID-based key-insulated for (ID-PKSET) cloud computing. The construction prevent data forgery, re-play attacks leakage keys harsh environments. Our scheme security property existential unforgeable chosen message attack (EUF-CMA) indistinquishable identity (IND-ID-CCA2) using random oracle model.

参考文章(36)
Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi, Efficient Identity-Based Signcryption in the Standard Model Provable Security. pp. 120- 137 ,(2011) , 10.1007/978-3-642-24316-5_10
Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long, Zhongmei Wan, Identity-Based Key-Insulated Signcryption Informatica (lithuanian Academy of Sciences). ,vol. 23, pp. 27- 45 ,(2012) , 10.15388/INFORMATICA.2012.347
Qin Wang, Zhenfu Cao, Two Proxy Signcryption Schemes from Bilinear Pairings Cryptology and Network Security. pp. 161- 171 ,(2005) , 10.1007/11599371_14
Xiangxue Li, Kefei Chen, Identity based proxy-signcryption scheme from pairings ieee international conference on services computing. pp. 494- 497 ,(2004) , 10.1109/SCC.2004.1358050
Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung, Key-Insulated Public Key Cryptosystems Advances in Cryptology — EUROCRYPT 2002. pp. 65- 82 ,(2002) , 10.1007/3-540-46035-7_5
Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai, Parallel Key-Insulated Public Key Encryption Public Key Cryptography - PKC 2006. pp. 105- 122 ,(2006) , 10.1007/11745853_8
Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang, Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy Intelligence and Security Informatics. pp. 126- 137 ,(2008) , 10.1007/978-3-540-69304-8_14
Guomin Yang, Chik How Tan, Qiong Huang, Duncan S. Wong, Probabilistic public key encryption with equality test the cryptographers track at the rsa conference. pp. 119- 131 ,(2010) , 10.1007/978-3-642-11925-5_9
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov, Timed-release and key-insulated public key encryption financial cryptography. pp. 191- 205 ,(2006) , 10.1007/11889663_17