Title of article :
One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity
Author/Authors :
Peng Xu، نويسنده , , Guo-Hua Cui، نويسنده , , Feng-Yu Lei، نويسنده , , Jing-Fang Xu، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2010
Pages :
10
From page :
4420
To page :
4429
Abstract :
In modern cryptosystem, Anonymity means that in some sense any adversary cannot tell which one of public keys has been used for encrypting a plaintext, and was first formally defined as the indistinguishability of keys by Bellare et al. in 2001. Recently, several well-known techniques have been proposed in order to achieve the anonymity of public-key encryption schemes. In this paper, anonymity is considered first from a new perspective. And then basing on this new perspective, a one-time encryption-key technique is proposed to achieve the anonymity of traditional discrete-logarithm-based (DL-based) encryption scheme. In this new technique, for each encryption, a random one-time encryption-key will be generated to encrypt the plaintext, instead of the original public-key. Consequently, in roughly speaking, by the randomness of the generated one-time encryption-key, this new technique should achieve the anonymity. Furthermore, in the formal proof of anonymity, only based on several weaker conditions, the one-time encryption-key technique efficiently achieves the provable indistinguishability of keys under chosen ciphertext attack (IK-CCA anonymity). As a result, compared with the work of Hayashi and Tanaka in 2006, the one-time encryption-key technique presented here has fewer requirements for achieving the provable anonymity.
Keywords :
Indistinguishability , Public-key encryption , Chosen ciphertext attack , anonymity , Discrete-logarithm-based encryption
Journal title :
Information Sciences
Serial Year :
2010
Journal title :
Information Sciences
Record number :
1214124
Link To Document :
بازگشت