dc.contributor | 資科系 | |
dc.creator (作者) | 曾一凡 | |
dc.creator (作者) | Tseng, Yi-Fan | |
dc.creator (作者) | Fan, Chun-I | |
dc.creator (作者) | Sung, Cheng-Wei | |
dc.date (日期) | 2019-07 | |
dc.date.accessioned | 2-Sep-2020 09:14:40 (UTC+8) | - |
dc.date.available | 2-Sep-2020 09:14:40 (UTC+8) | - |
dc.date.issued (上傳時間) | 2-Sep-2020 09:14:40 (UTC+8) | - |
dc.identifier.uri (URI) | http://nccur.lib.nccu.edu.tw/handle/140.119/131405 | - |
dc.description.abstract (摘要) | In 2010, Fan et al. first introduced the concept of anonymous multi-receiver identity-based encryption (AMRIBE). They used the concept of Fujisaki–Okamoto transformation (F.O. transformation) to support their proof in random oracle models. Recently, many works on this topic have been proposed. Most of them adopted Fujisaki–Okamoto transformation to achieve the indistinguishability of encryptions under multi-ID, chosen-ciphertext attacks (IND-MID-CCA) security. However, we find out that these schemes do not gain anonymity against insider attacks. In this manuscript, we use a sequence of games to prove that any AMRIBE scheme will fail to gain anonymity under chosen-ciphertext attacks and chosen-plaintext attacks if the IND-MID-CCA security is proven using Fujisaki–Okamoto transformation. | |
dc.format.extent | 129 bytes | - |
dc.format.mimetype | text/html | - |
dc.relation (關聯) | International Journal of Foundations of Computer Science, Vol.30, No.4, pp.493-509 | |
dc.subject (關鍵詞) | Fujisaki–Okamoto transformation ; anonymity ; chosen-ciphertext attacks ; identity-based encryption ; insider attacks | |
dc.title (題名) | On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation | |
dc.type (資料類型) | article | |
dc.identifier.doi (DOI) | 10.1142/S0129054119400094 | |
dc.doi.uri (DOI) | https://doi.org/10.1142/S0129054119400094 | |