ID-Based Ring Authenticated Encryption

Tianjie Cao,Dongdai Lin,Rui Xue
DOI: https://doi.org/10.1109/AINA.2005.203
2005-01-01
Abstract:Ring authenticated encryption has the following security requirements: semantic-security, recipient-designation, verification-dependence, verification-convertibility, recipient-ambiguity, recipient-verifiability, signer-ambiguity and signer-verifiability. Ring authenticated encryption can be used to enhance user privacy. In this paper, based on Boneh and Franklinyýs ID-based encryption scheme and Zhang and Kimýs ID-based ring signature scheme, we propose an ID-based ring authenticated encryption scheme. We also show that the proposed scheme satisfies the correctness property and all security requirements.
What problem does this paper attempt to address?