TY - JOUR
T1 - Fully secure constructions of spatial encryption with vector privacy
AU - Zhang, Mingwu
AU - Wang, Chunzhi
AU - Yang, Bo
AU - Takagi, Tsuyoshi
N1 - Publisher Copyright:
Copyright © 2013 John Wiley & Sons, Ltd.
PY - 2014/12/1
Y1 - 2014/12/1
N2 - An encryption scheme is a tuple of algorithms used to ensure secrecy while exchanging messages over a public channel. Spatial encryption is a generalized extension of id-based encryption with the ability of partial order role delegation. In this paper, we propose an efficient spatial encryption with vector privacy preservation, which is derived from the technique of static assumption from dual system encryption in composite order groups. The proposed scheme achieves the cryptosystem properties of message confidentiality, recipient anonymity, adaptively full security, and short constant ciphertext. Provable security in our setting consists of three steps: the first one is giving a rigorous definition of security, the second one is giving the construction of a scheme, and the last one is giving a rigorous mathematical proof showing that the scheme satisfies the security definition given in the first stage. Compared with related schemes, our proposed scheme has a comparable advantage in security while it holds an approximate computing efficiency and communicating payload such as public parameters, private keys, and ciphertexts.
AB - An encryption scheme is a tuple of algorithms used to ensure secrecy while exchanging messages over a public channel. Spatial encryption is a generalized extension of id-based encryption with the ability of partial order role delegation. In this paper, we propose an efficient spatial encryption with vector privacy preservation, which is derived from the technique of static assumption from dual system encryption in composite order groups. The proposed scheme achieves the cryptosystem properties of message confidentiality, recipient anonymity, adaptively full security, and short constant ciphertext. Provable security in our setting consists of three steps: the first one is giving a rigorous definition of security, the second one is giving the construction of a scheme, and the last one is giving a rigorous mathematical proof showing that the scheme satisfies the security definition given in the first stage. Compared with related schemes, our proposed scheme has a comparable advantage in security while it holds an approximate computing efficiency and communicating payload such as public parameters, private keys, and ciphertexts.
UR - http://www.scopus.com/inward/record.url?scp=84914673000&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84914673000&partnerID=8YFLogxK
U2 - 10.1002/dac.2613
DO - 10.1002/dac.2613
M3 - Article
AN - SCOPUS:84914673000
SN - 1074-5351
VL - 27
SP - 4307
EP - 4327
JO - International journal of digital and analog communication systems
JF - International journal of digital and analog communication systems
IS - 12
ER -