Verifiable and anonymous encryption in asymmetric bilinear maps

Hui Cui, Yi Mu, Man Ho Allen Au

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

Abstract

Consider a practical scenario: an untrusted gate-way is required to verify all the incoming information en-crypted via an encryption scheme, while the sender does not want to reveal any information about the plaintext and the privileged user to the gateway. That is, the gateway distributes the information to a predefined group of users and only the privileged user can open the message. To solve this problem, we need an access control mechanism to allow certain specification of the access control policies while protecting the users' privacy. With this scenario in mind, we propose the notion of verifiable and anonymous encryption where a verification function is added to the ciphertext, which captures the security requirements of the confidentiality of the plaintext and the anonymity of the privileged user. We present two specific constructions of our framework under the setting of asymmetric bilinear pairings in this paper. Our first scheme is proven confidential and anonymous under a weaker security model in the random oracle model, and our second one is built on the basis of a zero knowledge proof of knowledge under a strong security game.
Original languageEnglish
Title of host publicationProceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013
Pages704-711
Number of pages8
DOIs
Publication statusPublished - 1 Dec 2013
Externally publishedYes
Event12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 - Melbourne, VIC, Australia
Duration: 16 Jul 201318 Jul 2013

Conference

Conference12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013
CountryAustralia
CityMelbourne, VIC
Period16/07/1318/07/13

Keywords

  • Access control
  • Anonymity
  • Verification
  • Zero-knowledge proof of knowledge

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this