New identity-based key-encapsulation mechanism and its applications in cloud computing
by Hao Wang; Zhihua Zheng; Bo Yang
International Journal of High Performance Computing and Networking (IJHPCN), Vol. 8, No. 2, 2015

Abstract: Identity-based encryption (IBE) is an important primitive of identity-based cryptography. As such, it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user (e.g., a user's e-mail address). As a special form of IBE, identity-based key encapsulation mechanism (IB-KEM) can be used to create a random session key for encrypting messages. Any IB-KEM can be updated to a full IBE scheme by adding a symmetric encryption scheme with appropriate security properties. Currently, IB-KEM is a fundamental primitive of cryptography, and can be used to protect information system security, network security, cloud security, etc. In this paper, we construct a new IB-KEM in a generic levelled multilinear map setting and prove its security under multilinear decisional Diffie-Hellman assumption in the selective-ID model. Then, we make our IB-KEM translated to the GGH framework, which is proposed by Garg et al. (2013a). This framework defines an approximate version of a multilinear group family from ideal lattices. Finally, as an application of our new scheme, we introduce how to achieve secure transmission in the hierarchical architecture for cloud computing (HACC).

Online publication date: Tue, 23-Jun-2015

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of High Performance Computing and Networking (IJHPCN):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com