TY - JOUR
T1 - Anonymous encryption with partial-order subset delegation and its application in privacy email systems
AU - Zhang, Mingwu
AU - Nishide, Takashi
AU - Yang, Bo
AU - Takagi, Tsuyoshi
N1 - Copyright:
Copyright 2014 Elsevier B.V., All rights reserved.
PY - 2014
Y1 - 2014
N2 - In privacy-carrying email systems, the authors should guarantee that the email content is confidential and sometimes the sender/receiver identities are hidden. Also, they require that the key generation is flexible and manageable. In this study, first, they propose an anonymous encryption scheme that supports a partial-order subset delegatable ability. The proposed scheme achieves the security properties of confidentiality against adaptive chosen-plaintext attacks, anonymity against adaptive chosen-subset attacks and computational delegation indistinguishability. Secondly, they provide a deployment application of their anonymous encryption in an interdisciplinary group email management system with flexible and fine-grained key delegation. The deployment can achieve the privacy of message confidentiality, receiver anonymity and delegation obliviousness, which has fine-grained security in secure email systems. Finally, they provide an extension for the chosenciphertext secure scheme, and discuss the efficiency for decryption and the security level.
AB - In privacy-carrying email systems, the authors should guarantee that the email content is confidential and sometimes the sender/receiver identities are hidden. Also, they require that the key generation is flexible and manageable. In this study, first, they propose an anonymous encryption scheme that supports a partial-order subset delegatable ability. The proposed scheme achieves the security properties of confidentiality against adaptive chosen-plaintext attacks, anonymity against adaptive chosen-subset attacks and computational delegation indistinguishability. Secondly, they provide a deployment application of their anonymous encryption in an interdisciplinary group email management system with flexible and fine-grained key delegation. The deployment can achieve the privacy of message confidentiality, receiver anonymity and delegation obliviousness, which has fine-grained security in secure email systems. Finally, they provide an extension for the chosenciphertext secure scheme, and discuss the efficiency for decryption and the security level.
UR - http://www.scopus.com/inward/record.url?scp=84902595207&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84902595207&partnerID=8YFLogxK
U2 - 10.1049/iet-ifs.2013.0045
DO - 10.1049/iet-ifs.2013.0045
M3 - Article
AN - SCOPUS:84902595207
SN - 1751-8709
VL - 8
SP - 240
EP - 249
JO - IET Information Security
JF - IET Information Security
IS - 4
ER -