Identity-Based Group Encryption Revisited

  • Kanika Gupta
  • S. Sharmila Deva Selvi
  • C. Pandu Rangan
  • Shubham Sopan Dighe
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10631)

Abstract

In this paper, we focus on identity-based group encryption. We have revisited “Identity-Based Group Encryption (IBGE)” proposed by Xiling et al. Their scheme claims to achieve anonymity of the receiver. We have shown that the zero-knowledge proof they have used leaks much more information, due to which the verifier who is honest but curious will be able to identify the designated recipient.

Keywords

Group encryption Identity-based 

References

  1. 1.
    Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilineargroups. In: Electronic Colloquium on Computational Complexity (ECCC), vol. 14, no. 053 (2007)Google Scholar
  2. 2.
    Luo, X., Ren, Y., Liu, J., Hu, J., Liu, W., Wang, Z., Xu, W., Wu, Q.: Identity-based group encryption. In: Liu, J.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9723, pp. 87–102. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-40367-0_6CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Kanika Gupta
    • 1
  • S. Sharmila Deva Selvi
    • 1
  • C. Pandu Rangan
    • 1
  • Shubham Sopan Dighe
    • 2
  1. 1.Theoretical Computer Science Lab, Department of Computer Science and EngineeringIndian Institute of Technology MadrasChennaiIndia
  2. 2.National Institute of TechnologyTrichyIndia

Personalised recommendations