DocumentCode :
3087037
Title :
ID-based ring authenticated encryption
Author :
Cao, Tianjie ; Lin, Dongdai ; Xue, Rui
Author_Institution :
State Key Lab. of Inf. Security of Inst. of Software, Chinese Acad. of Sci., Beijing, China
Volume :
1
fYear :
2005
fDate :
28-30 March 2005
Firstpage :
591
Abstract :
Ring authenticated encryption has the following security requirements: semantic-security, recipient-designation, verification-dependence, verification-convertibility, recipient-ambiguity, recipient-verifiability, signer-ambiguity and signer-verifiability. Ring authenticated encryption can be used to enhance user privacy. In this paper, based on Boneh and Frankliny´s ID-based encryption scheme and Zhang and Kim´s ID-based ring signature scheme, we propose an ID-based ring authenticated encryption scheme. We also show that the proposed scheme satisfies the correctness property and all security requirements.
Keywords :
cryptography; data privacy; digital signatures; ID-based ring authenticated encryption; enhance user privacy; recipient-ambiguity security; recipient-designation security; recipient-verifiability security; semantic-security; signer-ambiguity security; signer-verifiability security; verification-convertibility security; verification-dependence security; Computer science; Computer security; Cryptography; Identity-based encryption; Information security; Laboratories; Law; Legal factors; Privacy; Public key;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on
ISSN :
1550-445X
Print_ISBN :
0-7695-2249-1
Type :
conf
DOI :
10.1109/AINA.2005.203
Filename :
1423554
Link To Document :
بازگشت