Skip to main content
placeholder image

A privacy preserving source verifiable encryption scheme

Journal Article


Abstract


  • It is critical to guarantee message confidentiality and user privacy in communication networks, especially for group communications. We find previous works seldom consider these aspects at the same time and some trivial solutions cannot remain secure under strong security models. In order to address the aforementioned problem properly, we propose a privacy-preserving source-verifiable encryption scheme. With our scheme, the sender can prove his legitimation to anyone in a set

    of users chosen by himself without leaking his identity, and only the intended receiver can retrieve the original message and the identity of the sender from a given ciphertext. Considering the security of our scheme, we define three security models which capture the message confidentiality, the user privacy and the user impersonation resistance respectively. We prove that our scheme maintains all the three aforementioned properties under the random oracle model.

Authors


  •   Yao, Zhongyuan (external author)
  •   Mu, Yi (external author)
  •   Yang, Guomin

Publication Date


  • 2016

Citation


  • Yao, Z., Mu, Y. & Yang, G. (2016). A privacy preserving source verifiable encryption scheme. Lecture Notes in Computer Science, 10060 182-193. Zhangjiajie, China Information Security Practice and Experience: 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings

Scopus Eid


  • 2-s2.0-84996555037

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/6170

Number Of Pages


  • 11

Start Page


  • 182

End Page


  • 193

Volume


  • 10060

Place Of Publication


  • Germany

Abstract


  • It is critical to guarantee message confidentiality and user privacy in communication networks, especially for group communications. We find previous works seldom consider these aspects at the same time and some trivial solutions cannot remain secure under strong security models. In order to address the aforementioned problem properly, we propose a privacy-preserving source-verifiable encryption scheme. With our scheme, the sender can prove his legitimation to anyone in a set

    of users chosen by himself without leaking his identity, and only the intended receiver can retrieve the original message and the identity of the sender from a given ciphertext. Considering the security of our scheme, we define three security models which capture the message confidentiality, the user privacy and the user impersonation resistance respectively. We prove that our scheme maintains all the three aforementioned properties under the random oracle model.

Authors


  •   Yao, Zhongyuan (external author)
  •   Mu, Yi (external author)
  •   Yang, Guomin

Publication Date


  • 2016

Citation


  • Yao, Z., Mu, Y. & Yang, G. (2016). A privacy preserving source verifiable encryption scheme. Lecture Notes in Computer Science, 10060 182-193. Zhangjiajie, China Information Security Practice and Experience: 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings

Scopus Eid


  • 2-s2.0-84996555037

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/6170

Number Of Pages


  • 11

Start Page


  • 182

End Page


  • 193

Volume


  • 10060

Place Of Publication


  • Germany