Title: Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes

Authors: Jianhong Zhang; Yuwei Xu; Jiancheng Zou

Addresses: Institution of Imagine Process and Pattern Recognition, North China University of Technology, Beijing 100144, China ' Institution of Imagine Process and Pattern Recognition, North China University of Technology, Beijing 100144, China ' Institution of Imagine Process and Pattern Recognition, North China University of Technology, Beijing 100144, China

Abstract: As an important cryptographic primitive, anonymous receiver encryption can protect the privacy of the receiver. To achieve it, Fan et al. proposed an anonymous multi-receiver ID-based encryption by using Lagrange interpolating polynomial in 2010. However, Wang et al. showed that Fan et al.'s scheme did not satisfy the anonymity of the receivers. Then they provided an improved scheme to fix it and showed that the improved scheme was secure. Unfortunately, in this paper, we pointed out that Wang et al.'s improved scheme did not satisfy the receiver's anonymity by analysing the security of the scheme. After analysing the reason to produce such flaws, we gave two improved methods to achieve the anonymity of the receivers. In the first improved scheme, the ciphertext length and computation complexity of producing and recovering ciphertext are more efficient than the ones in Wang et al.'s scheme. Furthermore, the second improved scheme has less computation cost than the first improved scheme in terms of encryption and decryption. The cipher length is 512 + | E | + w bits. To the best of our knowledge, our second improved scheme is most efficient in terms of computational cost.

Keywords: security analysis; receiver anonymity; pairing; anonymous multi-receiver encryption; ID-based cryptography; ciphertext length; computational complexity; computational cost.

DOI: 10.1504/IJIIDS.2013.056386

International Journal of Intelligent Information and Database Systems, 2013 Vol.7 No.5, pp.400 - 413

Received: 18 Jan 2013
Accepted: 22 Apr 2013

Published online: 31 Mar 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article