TY - GEN
T1 - Anonymous identity-based hash proof system and its applications
AU - Chen, Yu
AU - Zhang, Zongyang
AU - Lin, Dongdai
AU - Cao, Zhenfu
PY - 2012
Y1 - 2012
N2 - We introduce the concept of anonymous identity-based hash proof system (IB-HPS), and show how to use it to construct identity-based encryption schemes providing anonymity in the presence of key leakage. We give four different constructions of anonymous IB-HPS based on: (1) the decision bilinear Diffie-Hellman assumption, (2) the decision truncated augmented bilinear Diffie-Hellman exponent assumption, (3) the quadratic residuosity assumption, and (4) the decision learning with errors assumption.
AB - We introduce the concept of anonymous identity-based hash proof system (IB-HPS), and show how to use it to construct identity-based encryption schemes providing anonymity in the presence of key leakage. We give four different constructions of anonymous IB-HPS based on: (1) the decision bilinear Diffie-Hellman assumption, (2) the decision truncated augmented bilinear Diffie-Hellman exponent assumption, (3) the quadratic residuosity assumption, and (4) the decision learning with errors assumption.
UR - https://www.scopus.com/pages/publications/84866023601
U2 - 10.1007/978-3-642-33272-2_10
DO - 10.1007/978-3-642-33272-2_10
M3 - 会议稿件
AN - SCOPUS:84866023601
SN - 9783642332715
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 143
EP - 160
BT - Provable Security - 6th International Conference, ProvSec 2012, Proceedings
T2 - 6th International Conference on Provable Security, ProvSec 2012
Y2 - 26 September 2012 through 28 September 2012
ER -