An Asymmetric Multi-Recipient Encryption Scheme
نویسندگان
چکیده
Multi-recipient encryption schemes have many advantages such as high efficiency, low network cost, and flexible object control. An asymmetric multi-recipient encryption scheme with indistinguishability under chosen-ciphertext attack is proposed. The encryption scheme uses an eighth order linear feedback shift register. The main features of this scheme are small size of ciphertext and the overall data communication is also smaller than other asymmetric multi-recipient encryption schemes, hence it is suitable for using in networks of low bandwidth. Streszczenie. W artykule przedstawiono, odporny na ataki sposób szyfrowania asymetrycznego dla wielu odbiorników. Wykorzystany został rejestr przesuwny ze sprzężeniem liniowym ósmego rzędu. Głównymi zaletami algorytmu jest mały rozmiar klucza i mniejsza ilość danych do komunikacji. Szyfrowanie można także wykorzystać w sieciach o małej przepustowości. (Schemat szyfrowania asymetrycznego dla wielu odbiorców).
منابع مشابه
Multi-Recipient Encryption Schemes: Efficient Constructions and their Security
This paper proposes several new schemes which allow a sender to send encrypted messages to multiple recipients more efficiently (in terms of bandwidth and computation) than by using a standard encryption scheme. Most of the proposed schemes explore a new natural technique called randomness re-use. In order to analyze security of our constructions we introduce a new notion of multi-recipient enc...
متن کاملMulti-Recipient Encryption Schemes: Security Notions and Randomness Re-Use
This paper begins by refining Kurosawa’s [Ku] definitions of security for multi-recipient encryption schemes (MRESs). It then considers a subclass of MRESs, that are formed by transforming standard encryption schemes via a natural technique called randomness re-use, and that offer important performance benefits. The main result is a way to avoid ad-hoc analyses of such schemes: we provide a gen...
متن کاملRandomness Re-use in Multi-recipient Encryption Schemeas
Kurosawa showed how one could design multi-receiver encryption schemes achieving savings in bandwidth and computation relative to the naive methods. We broaden the investigation. We identify new types of attacks possible in multi-recipient settings, which were overlooked by the previously suggested models, and specify an appropriate model to incorporate these types of attacks. We then identify ...
متن کاملExtensions of Public-Key, Identity-Based and Certificateless Encryption Schemes
In this work, we first study extensions and applications of the identity-based encryption (IBE) primitive, focusing on generic constructions. We first define what is meant by an identity-based key encapsulation mechanism before extending it to the multi-recipient setting. We then propose an efficient multi-recipient scheme based on bilinear maps and then move on to investigate the properties of...
متن کاملPairing-Based Multi-Recipient Public Key Encryption
The growth of the Internet has triggered tremendous opportunities for broadcast service. However, the security issue of the broadcast has not been properly addressed. In this paper, we propose a new multi-recipient public key encryption scheme called ”Pairing-Based Multi-Recipient Encryption” (PBMRE)to achieve a secure broadcast transmission. In PBMRE, a ciphertext encrypted by an encryption ke...
متن کامل