• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups


Abstract

Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key, and it additionally provide the anonymity of identity in ciphertexts. Using the anonymous HIBE schemes, it is possible to construct anonymous communication systems and public key encryption with keyword search. This paper presents an anonymous HIBE scheme with constant size ciphertexts under prime order symmetric bilinear groups, and shows that it is secure under the selective security model. Previous anonymous HIBE schemes were constructed to have linear size ciphertexts, to use composite order bilinear groups, or to use asymmetric bilinear groups that is a special type of bilinear groups. Our construction is the first efficient anonymous HIBE scheme that has constant size ciphertexts and that uses prime order symmetric bilinear groups. Compared to the previous scheme of composite order bilinear groups, ours is ten times faster. To achieve our construction, we first devise a novel cancelable random blinding technique. The random blinding property of our technique provides the anonymity of our construction, and the cancellation property of our technique enables decryption.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Kwangsu Lee and Dong Hoon Lee, "New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups," KSII Transactions on Internet and Information Systems, vol. 4, no. 5, pp. 968-988, 2010. DOI: 10.3837/tiis.2010.10.016

[ACM Style]
Lee, K. and Lee, D. H. 2010. New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups. KSII Transactions on Internet and Information Systems, 4, 5, (2010), 968-988. DOI: 10.3837/tiis.2010.10.016