Journal on Communications ›› 2014, Vol. 35 ›› Issue (7): 33-37.doi: doi:10.3969/j.issn.1000-436x.2014.07.004

• paperⅠ:Cryptographic algorithms and security protocols • Previous Articles     Next Articles

Provably secure and efficient escrowable public key encryption schemes

Wen-hao LIU1,Sheng-bao WANG1(),Zhen-fu CAO2,Li-dong HAN1   

  1. 1 School of Information Science and Engineering,Hangzhou Normal University,Hangzhou 310012,China
    2 Department of Computer Science and Engineering,Shanghai Jiaotong University,Shanghai 200240,China
  • Online:2014-07-25 Published:2017-06-24
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Natural Science Foundation of Zhejiang Province;Education Department Foundation of Zhejiang Province;The Open Foundationa of State Key Laboratory of Networking and Switching Technology of China

Abstract:

In an escrowable public key encryption (E-PKE) scheme, there are two keys associated with one public key. It can reduce the total number of certificates in the public key infrastructure (PKI) to a large extent, thus degrade the com-plexity of certificate management. Moreover, an E-PKE scheme can also reduce the key storage for end users. Two such schemes were proposed, with the second one being the most efficient one among all existing E-PKE schemes. It is also the first provably secure E-PKE scheme, whose security is based on the standard bilinear Diffie-Hellman (BDH) assump-tion.

Key words: cryptographic algorithm, encryption scheme, escrowable public key encryption, provable security

No Suggested Reading articles found!