2013
DOI: 10.1007/978-3-642-38980-1_15
|View full text |Cite
|
Sign up to set email alerts
|

Toward Practical Group Encryption

Abstract: Abstract.A group encryption scheme allows anyone to form a ciphertext for a given group member while keeping the receiver's identity private. At the same time, the encryptor is capable of proving that some (anonymous) group member is able to decrypt the ciphertext and, optionally, that the corresponding plaintext satisfies some a priori relation (to prevent sending bogus messages). Finally, in case of a dispute, the identity of the intended receiver can be recovered by a designated authority. In this paper, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…Group encryption [2,15,28] is the encryption analog of the group signature, where an encryptor can make a ciphertext for a group member and can establish a proof that the receiver is a group member without any identification. Moreover, the opener can identify who the actual receiver is, as in the case of a group signature.…”
Section: Related Workmentioning
confidence: 99%
“…Group encryption [2,15,28] is the encryption analog of the group signature, where an encryptor can make a ciphertext for a group member and can establish a proof that the receiver is a group member without any identification. Moreover, the opener can identify who the actual receiver is, as in the case of a group signature.…”
Section: Related Workmentioning
confidence: 99%
“…In order to keep users accountable for their actions, an opening authority (OA) is further empowered with some information allowing it to un-anonymize signatures/ciphertexts. Kiayias, Tsiounis and Yung [34] formalized GE schemes as a primitive allowing the sender to generate publicly verifiable guarantees that: (1) The ciphertext is well-formed and intended for some registered group member who will be able to decrypt; (2) the opening authority will be able identify the receiver if necessary; (3) The plaintext satisfies certain properties such as being a witness for some public relation or the private key that underlies a given public key. In the model of Kiayias et al [34], the message secrecy and anonymity properties are required to withstand active adversaries, which are granted access to decryption oracles in all security experiments.…”
Section: Introductionmentioning
confidence: 99%
“…Cathalo, Libert and Yung [18] designed a non-interactive system in the standard model under non-interactive pairing-related assumptions. El Aimani and Joye [3] suggested various efficiency improvements with both interactive and non-interactive proofs.…”
Section: Introductionmentioning
confidence: 99%
“…In order to keep users accountable for their actions, an opening authority (OA) is further empowered with some information allowing it to un-anonymize signatures/ciphertexts. Kiayias, Tsiounis and Yung [34] formalized GE schemes as a primitive allowing the sender to generate publicly verifiable guarantees that: (1) The ciphertext is well-formed and intended for some registered group member who will be able to decrypt; (2) the opening authority will be able identify the receiver if necessary; (3) The plaintext satisfies certain properties such as being a witness for some public relation or the private key that underlies a given public key. In the model of Kiayias et al [34], the message secrecy and anonymity properties are required to withstand active adversaries, which are granted access to decryption oracles in all security experiments.…”
Section: Introductionmentioning
confidence: 99%