TY - JOUR
T1 - Star-Topological Encryption
T2 - Talking to the Sever but Hiding Identities to Others ∗
AU - Li, Jing
AU - Wang, Licheng
AU - Niu, Xinxin
AU - Gu, Lize
AU - Qu, Zhiguo
N1 - Publisher Copyright:
© 2018 IOS Press. All rights reserved.
PY - 2018
Y1 - 2018
N2 - In this paper, we propose the notion of Star-Topological encryption that enables some clients confidentially talking to a server but without revealing their identities to others. Then, an encryption scheme is constructed to achieve this cryptosystem based on non-abelian groups. The proposal realizes identity-based encryption and identity authenticity, simultaneously. In this encryption system, both the encryptions and decryptions of two sides of the communications are relying on secret key. Therefore, the encryption/decryption algorithms employ the idea of symmetric key cryptosystem. Meanwhile, the client's decryption key is generated by taking client's identity and server's master secret key as input. Therefore, our encryption scheme can be viewed as an identity-based encryption in Symmetric Key Cryptosystem. Furthermore, the security of the scheme is based on the intractability of factorization search problem over non-abelian algebraic structures. A matrix group over group ring is suggested and an algorithm of computing the inverse of an invertible group ring element is given. Finally, we discuss that our cryptosystem is secure against determinant attacks and quantum attacks.
AB - In this paper, we propose the notion of Star-Topological encryption that enables some clients confidentially talking to a server but without revealing their identities to others. Then, an encryption scheme is constructed to achieve this cryptosystem based on non-abelian groups. The proposal realizes identity-based encryption and identity authenticity, simultaneously. In this encryption system, both the encryptions and decryptions of two sides of the communications are relying on secret key. Therefore, the encryption/decryption algorithms employ the idea of symmetric key cryptosystem. Meanwhile, the client's decryption key is generated by taking client's identity and server's master secret key as input. Therefore, our encryption scheme can be viewed as an identity-based encryption in Symmetric Key Cryptosystem. Furthermore, the security of the scheme is based on the intractability of factorization search problem over non-abelian algebraic structures. A matrix group over group ring is suggested and an algorithm of computing the inverse of an invertible group ring element is given. Finally, we discuss that our cryptosystem is secure against determinant attacks and quantum attacks.
KW - Factorization Search Problem
KW - Group Ring Matrix
KW - Star-Topological Encryption
UR - https://www.scopus.com/pages/publications/85048120027
U2 - 10.3233/FI-2018-1616
DO - 10.3233/FI-2018-1616
M3 - Article
AN - SCOPUS:85048120027
SN - 0169-2968
VL - 157
SP - 29
EP - 46
JO - Fundamenta Informaticae
JF - Fundamenta Informaticae
IS - 1-2
ER -