Verifiable outsourcing private key generation algorithm in an identity-based encryption scheme

An identity-based encryption scheme with verifiable outsourcing private key generation algorithm was proposed where the PKG outsourcers the task of private key generation to the server, and could verify the correctness of the outsourcing result effectively. The distinguish ability of the cipher text...

Full description

Saved in:
Bibliographic Details
Published inTongxin Xuebao Vol. 36; no. 11; pp. 2015233 - 2015236
Main Authors Ren, Yan-Li, Cai, Jian-Xing, Huang, Chun-Shui, Gu, Da-Wu
Format Journal Article
LanguageChinese
Published 01.11.2015
Subjects
Online AccessGet full text
ISSN1000-436X
DOI10.11959/j.issn.1000-436x.2015233

Cover

More Information
Summary:An identity-based encryption scheme with verifiable outsourcing private key generation algorithm was proposed where the PKG outsourcers the task of private key generation to the server, and could verify the correctness of the outsourcing result effectively. The distinguish ability of the cipher text and verifiability of the outsourcing result was proved without random oracles, and the proposed scheme was realized in a simulation environment. The experiment shows that the cost of the PKG is smaller than that of the servers, and it is much smaller than that of computing the private keys of all users directly.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:1000-436X
DOI:10.11959/j.issn.1000-436x.2015233