A Novel Construction of Updatable Identity-Based Hash Proof System and Its Applications

نویسندگان

چکیده

In the previous works, to further provide continuous leakage resilience for identity-based encryption scheme, a new cryptography primitive, called updatable hash proof system (U-IB-HPS), was proposed. However, most of existing constructions have some deficiencies, they either do not perfect key update function or corresponding security with tight reduction relies on non-static complexity assumption. To address above problems, construction U-IB-HPS is created, and our proved based static Also, comparisons analysis performances show that proposal only achieves anonymity, but also has reduction. additional, same computational efficiency as other systems. illustrate practical U-IB-HPS, generic method non-interactive data authorization protocol designed by employing an underlying tool, which can leakage-resilient cloud computing. Hence, application field extended through study.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generalized (identity-based) hash proof system and its applications

In this work, we generalize the paradigm of hash proof system (HPS) proposed by Cramer and Shoup [CS02]. In the central of our generalization, we lift subset membership problem to distribution distinguish problem. Our generalized HPS clarifies and encompass all the known publickey encryption (PKE) schemes that essentially implement the idea of hash proof system. Moreover, besides existing smoot...

متن کامل

construction and validation of a computerized adaptive translation test (a receptive based study)

آزمون انطباقی رایانه ای (cat) روشی نوین برای سنجش سطح علمی دانش آموزان می باشد. در حقیقت آزمون های رایانه ای با سرعت بالایی به سمت و سوی جایگزین عملی برای آزمون های کاغذی می روند (کینگزبری، هاوسر، 1993). مقاله حاضر به دنبال آزمون انطباقی رایانه ای برای ترجمه می باشد. بدین منظور دو پرسشنامه مشتمل بر 55 تست ترجمه میان 102 آزمودنی و 10 مدرس زبان انگلیسی پخش گردید. پرسشنامه اول میان 102 دانشجوی س...

Hierarchical Identity-Based Chameleon Hash and Its Applications

At ACNS 2008, Canard et al. introduced the notion of trapdoor sanitizable signature (TSS) based on identity-based chameleon hash (IBCH). Trapdoor sanitizable signatures allow the signer of a message to delegate, at any time, the power of sanitization to possibly several entities who can modify predetermined parts of the message and generate a new signature on the sanitized message without inter...

متن کامل

Identity-Based Chameleon Hash and Applications

Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advanta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Chinese Journal of Electronics

سال: 2023

ISSN: ['1022-4653', '2075-5597']

DOI: https://doi.org/10.23919/cje.2022.00.203