中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 信息安全国家重点实验室  > 会议论文
题名:
acquiring key privacy from data privacy
作者: Zhang Rui
会议文集: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
会议名称: 6th China International Conference on Information Security and Cryptology, Inscrypt 2010
会议日期: 20-Oct
出版日期: 2011
会议地点: Shanghai, China
关键词: Public key cryptography
出版地: Germany
收录类别: EI
ISSN: 3029743
ISBN: 9783642215179
部门归属: (1) State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, China; (2) Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Japan
主办者: State Key Laboratory of Information Security; Chinese Academy of Sciences; Chinese Association for Cryptologic Research
英文摘要: A primary functionality of public key encryption schemes is data privacy, while in many cases key privacy (aka. anonymity of public keys) may also be important. Traditionally, one has to separately design/prove them, because data privacy and key privacy were shown to be independent from each other [5,40]. Existing constructions of anonymous public key encryption usually take either of the following two approaches: 1 Directly construct it from certain number theoretic assumptions. 2 Find a suitable anonymous encryption scheme with key privacy yet without chosen ciphertext security, then use some dedicated transforms to upgrade it to one with key privacy and chosen ciphertext security. While the first approach is intricate and a bit mysterious, the second approach is unnecessarily a real solution to the problem, namely, how to acquire key privacy. In this paper, we show how to build anonymous encryption schemes from a class of key encapsulation mechanisms with only weak data privacy, in the random oracle model. Instantiating our generic construction, we obtain many interesting anonymous public key encryption schemes. We note that some underlying schemes are based on gap assumptions or with bilinear pairings, which were previously well-known not anonymous. © 2011 Springer-Verlag.
内容类型: 会议论文
URI标识: http://ir.iscas.ac.cn/handle/311060/14369
Appears in Collections:信息安全国家重点实验室_会议论文

Files in This Item:
File Name/ File Size Content Type Version Access License
acquiring key privacy from data privacy.pdf(246KB)----限制开放-- 联系获取全文

Recommended Citation:
Zhang Rui. acquiring key privacy from data privacy[C]. 见:6th China International Conference on Information Security and Cryptology, Inscrypt 2010. Shanghai, China. 20-Oct.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Zhang Rui]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Zhang Rui]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2017  中国科学院软件研究所 - Feedback
Powered by CSpace