期刊文献+

Parallel Key Insulated ID-Based Public Key Cryptographic Primitive with Outsourced Equality Test

Parallel Key Insulated ID-Based Public Key Cryptographic Primitive with Outsourced Equality Test
下载PDF
导出
摘要 Parallel key-insulation allows the use of multiple helper keys to protect private decryption keys during secret decryption key updates. This approach prevents decryption key leakage or exposure in insecure environment. We combined parallel key-insulated encryption (PKIE) with multiple helper keys and identity-based encryption with the equality test (IBE-ET) to obtain parallel key insulated ID-based public key encryption with outsourced equivalent test (PKI-IBPKE-ET). The scheme inherits the advantages of identity-based encryption (IBE), which simplifies certificate management for public key encryption. Furthermore, the parallel key-insulation with multiple helper mechanism was introduced in our scheme, which perfectly reduced the possibility of helper key exposure. Our scheme will enable the protection and periodic update of decryption keys in insecure environment. Our scheme achieves a weak indistinguishable identity chosen ciphertext (W-IND-ID-CCA) security in the random oracle model. Ultimately, it is observed that our scheme is feasible and practical through the experimental simulation and theoretical analysis. Parallel key-insulation allows the use of multiple helper keys to protect private decryption keys during secret decryption key updates. This approach prevents decryption key leakage or exposure in insecure environment. We combined parallel key-insulated encryption (PKIE) with multiple helper keys and identity-based encryption with the equality test (IBE-ET) to obtain parallel key insulated ID-based public key encryption with outsourced equivalent test (PKI-IBPKE-ET). The scheme inherits the advantages of identity-based encryption (IBE), which simplifies certificate management for public key encryption. Furthermore, the parallel key-insulation with multiple helper mechanism was introduced in our scheme, which perfectly reduced the possibility of helper key exposure. Our scheme will enable the protection and periodic update of decryption keys in insecure environment. Our scheme achieves a weak indistinguishable identity chosen ciphertext (W-IND-ID-CCA) security in the random oracle model. Ultimately, it is observed that our scheme is feasible and practical through the experimental simulation and theoretical analysis.
作者 Seth Alornyo Mustapha Adamu Mohammed Bright Anibrika Selorm Kodzo Pious Akwasi Sarpong Michael Asante Seth Alornyo;Mustapha Adamu Mohammed;Bright Anibrika Selorm Kodzo;Pious Akwasi Sarpong;Michael Asante(Koforidua Technical University, Computer Science Department, Koforidua, Ghana;Kwame Nkrumah University of Science and Technology, Kumasi, Ghana;SDA College of Education, Asokore, Koforidua)
出处 《Journal of Computer and Communications》 2020年第12期197-213,共17页 电脑和通信(英文)
关键词 Identity-Based Encryption Equality Test Parallel Key-Insulated Identity-Based Encryption Equality Test Parallel Key-Insulated
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部