Pairing-based public-key encryption schemes with backward-and-forward security
MetadataShow full item record
Identity-based cryptosystems utilize some arbitrary strings as the participants' public key in the underlying system. The encryptioner will not need to obtain the decryptioner's certificate. That will simplify the certificate management. Therefore, it is still interesting to propose some new identity-based encryption schemes. In this paper we will propose two new different constructions, i.e. receiptor-oriented encryption schemes. They are both identity-based encryption schemes and also based on pairings. The proposed encryption schemes have a new advantage, i.e. backward-and-forward security. In addition, we provide the security analysis for the proposed schemes.
Showing items related by title, author, creator and subject.
Han, Song; Chang, Elizabeth; Liu, Wan-quan; Potdar, Vidyasagar; Wang, J. (2005)Various public key encryption systems have been proposed in modern information techology. Some of them have also been used in various applications, such as E-commerce and mobile database. This paper proposes two secure ...
Tian, Biming; Han, Song; Parvin, Sazia; Dillon, Tharam S. (2010)The security of Wireless Sensor Networks (WSNs) has a direct reliance on secure and efficient key management. This leaves key management as a fundamental research topic in the field of WSNs security. Among the proposed ...
Tian, Biming; Han, Song; Liu, Liu; Khadem, Saghar; Parvin, Sazia (2011)ZigBee is one of impartment wireless technologies now being widely deployed in wireless sensor networks (WSNs). However, ZigBee exhibits several security concerns especially insufficiently addressed key management mechanism. ...