Abstract
In a verifiable encryption, an asymmetrically encrypted ciphertext can be publicly verified to be decipherable by a designated receiver while maintaining the semantic security of the message. In this paper, we introduce Custodian-Hiding Verifiable Encryption, where it can be publicly verified that there exists at least one custodian (user), out of a designated group of n custodians (users), who can decrypt the message, while the semantic security of the message and the anonymity of the actual decryptor are maintained. Our scheme is proven secure in the random oracle model. We also introduce two extensions to decryption by a subset of more than one user.
Original language | English |
---|---|
Title of host publication | 5th International Workshop on Information Security Applications, WISA 2004 |
Publisher | Springer |
Pages | 51-64 |
Number of pages | 14 |
Publication status | Published - 2005 |
Externally published | Yes |
Event | International Workshop on Information Security Applications 2004 - Jeju Island, Korea, South Duration: 23 Aug 2004 → 25 Aug 2004 Conference number: 5th https://link.springer.com/book/10.1007/b103174 (Proceedings) |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 3325 |
ISSN (Print) | 0302-9743 |
Workshop
Workshop | International Workshop on Information Security Applications 2004 |
---|---|
Abbreviated title | WISA 2004 |
Country/Territory | Korea, South |
City | Jeju Island |
Period | 23/08/04 → 25/08/04 |
Internet address |
|
Keywords
- Anonymity
- Publicly Verifiable
- Verifiable Encryption