Skip to main content
Log in

Identity-based encryption with non-interactive opening

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

An identity-based encryption (IBE) was studied with non-interactively opening property that the plain text of a ciphertext can be revealed without affecting the security of the encryption system. Two kinds of non-interactive opening properties for IBE schemes were defined along with a concrete scheme in each case.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Damgard I, Thorbek R. Non-interactive proofs for integer multiplication [C]// Proc Eurocrypt 2007. Barcelona, NJ: Springer, 2007: 412–429.

    Chapter  Google Scholar 

  2. Damgard I, Holfheins D, Kiltz E et al. Public-key with non-interactive opening [C]// Proc CT-RSA 2008. San Francisco, NJ: Springer, 2008: 239–255.

    Google Scholar 

  3. Shamir A. Identity-based cryptosystems and signature schemes [C]// Proc Crypto 1984. Santa Barbara, NJ: Springer, 1984: 47–53.

    Google Scholar 

  4. Kiltz E. Chosen-ciphertext secure identity-based encryption in the standard model with short ciphertexts [EB/OL]. http://eprint.iacr.org/2006/122, 2006.

  5. Waters B. Efficient identity-based encryption without random oracles [C]// Proc Eurocrypt 2005. Aarhus, NJ: Springer, 2005: 114–127.

    Google Scholar 

  6. Boyen X, Mei Q X, Waters B. Direct chosen ciphertext security from identity-based techniques [C]// Proc ACM CCS 05. Alexandria, NJ: Springer, 2005: 320–329.

    Chapter  Google Scholar 

  7. Boneh D, Franklin M. Identity based encryption from the weil pairing [J]. Journal of Computing, 2003, 33(3): 586–615.

    MathSciNet  Google Scholar 

  8. Cramer R, Shoup V. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack [J]. Journal of Computing, 2003, 33(1): 167–226

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jia Fan  (范 佳).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fan, J., Tang, Xh., Kang, L. et al. Identity-based encryption with non-interactive opening. J. Shanghai Jiaotong Univ. (Sci.) 13, 670–674 (2008). https://doi.org/10.1007/s12204-008-0670-y

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-008-0670-y

Key words

CLC number

Navigation