Anonymous identity-based hash proof system and its applications

  • Yu Chen
  • , Zongyang Zhang*
  • , Dongdai Lin
  • , Zhenfu Cao
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

26 Scopus citations

Abstract

We introduce the concept of anonymous identity-based hash proof system (IB-HPS), and show how to use it to construct identity-based encryption schemes providing anonymity in the presence of key leakage. We give four different constructions of anonymous IB-HPS based on: (1) the decision bilinear Diffie-Hellman assumption, (2) the decision truncated augmented bilinear Diffie-Hellman exponent assumption, (3) the quadratic residuosity assumption, and (4) the decision learning with errors assumption.

Original languageEnglish
Title of host publicationProvable Security - 6th International Conference, ProvSec 2012, Proceedings
Pages143-160
Number of pages18
DOIs
StatePublished - 2012
Externally publishedYes
Event6th International Conference on Provable Security, ProvSec 2012 - Chengdu, China
Duration: 26 Sep 201228 Sep 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7496 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Provable Security, ProvSec 2012
Country/TerritoryChina
CityChengdu
Period26/09/1228/09/12

Fingerprint

Dive into the research topics of 'Anonymous identity-based hash proof system and its applications'. Together they form a unique fingerprint.

Cite this