作者
Habib Allah Yajam, Javad Mohajeri, Mahmoud Salmasizadeh
发表日期
2015/11/25
期刊
Security and Communication Networks
卷号
8
期号
17
页码范围
2992-3001
简介
In order to provide anonymity, universal cryptosystems have been used in various applications, including mixnets with multiple receivers. Unlike ordinary re‐encryption cryptosystems, universal cryptosystems for re‐encryption of ciphertexts do not require knowledge of the public key of the receiver. Golle et al. introduced universal cryptosystems for public key cryptography. Contrary to public key cryptography, in ID‐based cryptography, a public key infrastructure is not needed, which makes it suitable for situations where it is not cost‐effective to distribute certificates or establish a public key infrastructure. In this paper, we first generalize the definition of universal cryptosystems and the notion of universal semantic security to ID‐based cryptography, then we propose two ID‐based universal cryptosystem schemes, and lastly we prove the security of these two schemes. The first scheme has higher efficiency in terms of …
引用总数
201820192020202120221111
学术搜索中的文章
HA Yajam, J Mohajeri, M Salmasizadeh - Security and Communication Networks, 2015