Anonymous Identity-Based Encryption can protect privacy of the receiver. However, there are some situations that we need to re- cover the identity of the receiver, for example a dispute occurs or the privacy mechanism is abused. In this paper, we propose a new con- cept, referred to as ...
Identity-based encryption (IBE), introduced by Shamir, eliminates the need for public-key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up the public key. In particular, when ciphertexts of an ...
we present a novel anonymous identity-based encryption scheme. Our scheme comes from the analysis of Boyen-Waters anonymous IBE Scheme in which we find a method to construct anonymous IBE schemes. We show that Boyen-Waters anonymous
Certificateless encryption is used to grant user anonymity during authentication between the WBAN user and the access point. This is achieved by allowing the client to use a private key to sign a pseudo-identity, and sends this to the access point. When the access point receives the ...
Spatial encryption, which is a kind of functional encryption, provides a generalized framework for special property encryption schemes such as broadcast encryption, predicate encryption, forward secure encryption, (hierarchical) identity-based encryption, delegatable attribute-based encryption etc. In this ...
Considerable authority ciphertext policy that prioritizes privacy Li et al. [16] developed Attribute-based encryption (ABE) to encrypt attribute data with ciphertext and track down the identity of a dishonest user who divulges the decryption key. This system was designed to track a fraudulent use...
a new anonymous private key sharing scheme is proposed, user private key sharing problem can be converted to the secret sharing problem for integers,a lot of bilinear pairing computations is reduced, the risk of compromising secret of the identity-based encryption scheme is reduced,the problem of...
In this paper, we present an improved certificateless-based authentication and aggregate signature scheme, which can properly solve the coalition attack. Moreover, the proposed scheme not only uses pseudonyms in communications to prevent vehicles from revealing their identity but also achieves considerable...
Boneh D and Franklin M (2001) ‘Identity-based encryption from the Weil pairing’ in Advances in Cryptology-CRYPTO: Proceedings of 21st Annual International Cryptology Conference, Santa Barbara, California, USA, vol. 2139:213–229. Cygwin: Linux Environment Emulator for Windows. [Online] http://...
In this paper, we developed a new secure anonymous authentication scheme for mobile roaming services using an identity-based pairings encryption scheme and an identity-based ECC batch signature scheme. The proposed scheme does not need the help of the home server during authentication, and gives bet...