scholarly journals New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication

2015 ◽  
Vol 2015 ◽  
pp. 1-10
Author(s):  
Minqing Zhang ◽  
Xu An Wang ◽  
Xiaoyuan Yang ◽  
Weihua Li

In SCN12, Nieto et al. discussed an interesting property of public key encryption with chosen ciphertext security, that is, ciphertexts with public verifiability. Independently, we introduced a new cryptographic primitive, CCA-secure publicly verifiable public key encryption without pairings in the standard model (PVPKE), and discussed its application in proxy reencryption (PRE) and threshold public key encryption (TPKE). In Crypto’09, Hofheiz and Kiltz introduced the group of signed quadratic residues and discussed its application; the most interesting feature of this group is its “gap” property, while the computational problem is as hard as factoring, and the corresponding decisional problem is easy. In this paper, we give new constructions ofPVPKEscheme based on signed quadratic residues and analyze their security. We also discussPVPKE’s important application in modern information systems, such as achieving ciphertext checkable in the cloud setting for the mobile laptop, reducing workload by the gateway between the open internet and the trusted private network, and dropping invalid ciphertext by the routers for helping the network to preserve its communication bandwidth.

2012 ◽  
Vol 210 ◽  
pp. 67-80 ◽  
Author(s):  
Bo Qin ◽  
Qianhong Wu ◽  
Lei Zhang ◽  
Oriol Farràs ◽  
Josep Domingo-Ferrer

2016 ◽  
Vol 630 ◽  
pp. 95-116 ◽  
Author(s):  
Yusuke Sakai ◽  
Keita Emura ◽  
Jacob C.N. Schuldt ◽  
Goichiro Hanaoka ◽  
Kazuo Ohta

2019 ◽  
Vol 35 (3) ◽  
pp. 233-249
Author(s):  
Van Anh Trinh ◽  
Viet Cuong Trinh

We address the problem of searching on encrypted data with expressive searching predicate and multi-writer/multi-reader, a cryptographic primitive which has many concrete application scenarios such as cloud computing, email gateway application and so on. In this paper, we propose a public-key encryption with keyword search scheme relied on the ciphertext-policy attribute-based encryption scheme. In our system, we consider the model where a user can generate trapdoors by himself/herself, we thus can remove the Trusted Trapdoor Generator which can save the resource and communication overhead. We also investigate the problem of combination of a public key encryption used to encrypt data and a public-key encryption with keyword search used to encrypt keywords, which can save the storage of the whole system


Sign in / Sign up

Export Citation Format

Share Document