scholarly journals Generalized Galbraith’s Test: Characterization and Applications to Anonymous IBE Schemes

Mathematics ◽  
2021 ◽  
Vol 9 (11) ◽  
pp. 1184
Author(s):  
Paul Cotan ◽  
George Teşeleanu

The main approaches currently used to construct identity-based encryption (IBE) schemes are based on bilinear mappings, quadratic residues and lattices. Among them, the most attractive approach is the one based on quadratic residues, due to the fact that the underlying security assumption is a well-understood hard problem. The first such IBE scheme was constructed by Cocks, and some of its deficiencies were addressed in subsequent works. In this paper, we focus on two constructions that address the anonymity problem inherent in Cocks’ scheme, and we tackle some of their incomplete theoretical claims. More precisely, we rigorously study Clear et al.’s and Zhao et al.’s schemes and give accurate probabilities of successful decryption and identity detection in the non-anonymized version of the schemes. Furthermore, in the case of Zhao et al.’s scheme, we give a proper description of the underlying security assumptions.

2019 ◽  
Vol 2019 ◽  
pp. 1-12 ◽  
Author(s):  
Daode Zhang ◽  
Jie Li ◽  
Bao Li ◽  
Xianhui Lu ◽  
Haiyang Xue ◽  
...  

There only exists one deterministic identity-based encryption (DIBE) scheme which is adaptively secure in the auxiliary-input setting, under the learning with errors (LWE) assumption. However, the master public key consists of O(λ) basic matrices. In this paper, we consider to construct adaptively secure DIBE schemes with more compact public parameters from the LWE problem. (i) On the one hand, we gave a generic DIBE construction from lattice-based programmable hash functions with high min-entropy. (ii) On the other hand, when instantiating our generic DIBE construction with four LPHFs with high min-entropy, we can get four adaptively secure DIBE schemes with more compact public parameters. In one of our DIBE schemes, the master public key only consists of ω(log⁡λ) basic matrices.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Yanli Ren ◽  
Min Dong ◽  
Zhihua Niu ◽  
Xiaoni Du

It is well known that the computation of bilinear pairing is the most expensive operation in pairing-based cryptography. In this paper, we propose a noninteractive verifiable outsourcing algorithm of bilinear pairing based on two servers in the one-malicious model. The outsourcer need not execute any expensive operation, such as scalar multiplication and modular exponentiation. Moreover, the outsourcer could detect any failure with a probability close to 1 if one of the servers misbehaves. Therefore, the proposed algorithm improves checkability and decreases communication cost compared with the previous ones. Finally, we utilize the proposed algorithm as a subroutine to achieve an anonymous identity-based encryption (AIBE) scheme with outsourced decryption and an identity-based signature (IBS) scheme with outsourced verification.


Author(s):  
Jae Hong SEO ◽  
Tetsutaro KOBAYASHI ◽  
Miyako OHKUBO ◽  
Koutarou SUZUKI

2015 ◽  
Vol 43 (3) ◽  
pp. 249-272 ◽  
Author(s):  
Soo-Hyun Mun

This article contributes to the debate between the merits of the ‘politics of presence’ versus the ‘politics of ideas’ by examining the case of the first female Korean president, Park Geun-Hye. On the one hand, Park did not represent ‘the ideas’ of feminist politics. While her gender identity was widely propagated and accepted, it did not transform into deliberate identity-based politics. On the other hand, she contributed to the elevation of women’s social status through various unintended consequences, although Park’s ‘femininity without feminism’ inevitably led to the negligence of gender politics in her government. Indeed, Park’s existence, rather than her intention, stimulated the debate on the role and status of women in Korean society and enabled the rise of a number of first females in various sectors. In sum, the ‘politics of presence’ was triggered even without overt political measures.


Religions ◽  
2021 ◽  
Vol 12 (6) ◽  
pp. 380
Author(s):  
Matthew John Paul Tan

This paper will focus on one element of the pushback against the massive influx of immigrants taken in for humanitarian purposes, namely, an identity-based chauvinism which uses identity as the point of resistance to the perceived dilution of that identity, brought about by the transformation of culture induced by the incorporation of a foreign other. The solution to this perceived dilution is a simultaneous defence of that culture and a demand for a conformity to it. While those in the critical tradition have encouraged a counter-position of revolutionary transformation by the other through ethics, dialogue, or the multitude, such a transformation is arguably impeded by what is ultimately a repetition of the metaphysics of conformity. Drawing on the personalism of Emmanuel Mounier and the Eucharistic theology of Creston Davis and Aaron Riches, this paper submits an alternative identity politics position that completes the revolutionary impulse. Identity here is not the flashpoint of a self-serving conflict, but the launch-point of politics of self-emptying, whose hallmarks include, on the one hand, a never-ending reception of transformation by the other, and on the other hand, an anchoring in the Body of Christ that is at once ever-changing and never-changing.


Sign in / Sign up

Export Citation Format

Share Document