{"title":"高效一对一共享:公钥配对加密","authors":"Yunhao Ling , Guang Zhang , Jie Chen , Haifeng Qian","doi":"10.1016/j.sysarc.2025.103492","DOIUrl":null,"url":null,"abstract":"<div><div>Identity-Based Matchmaking Encryption (IB-ME) enables both the sender and the receiver to respectively specify an identity that the other party must satisfy, in order to reveal the messages. IB-ME is actually a one-to-one matchmaking encryption, and has many applications such as secure data sharing and non-interactive secret handshake protocol. However, the system requires a central authority to generate encryption keys and decryption keys for all users, which could lead to key escrow problem, single-point failure and performance bottleneck. The goal of this paper is to remove any authority from the system. We propose a matchmaking encryption in public-key setting, named Public Key Matchmaking Encryption (PK-ME). We give the formal syntax and security definition of PK-ME, present a lightweight PK-ME scheme, and formally prove its security in the random model. Finally, we conduct experiments to show the practicability of the scheme. In particular, compared to the related ME schemes, our encryption and decryption are very efficient, and our PK-ME scheme has shorter parameters.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"167 ","pages":"Article 103492"},"PeriodicalIF":3.7000,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Efficient one-to-one sharing: Public key matchmaking encryption\",\"authors\":\"Yunhao Ling , Guang Zhang , Jie Chen , Haifeng Qian\",\"doi\":\"10.1016/j.sysarc.2025.103492\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Identity-Based Matchmaking Encryption (IB-ME) enables both the sender and the receiver to respectively specify an identity that the other party must satisfy, in order to reveal the messages. IB-ME is actually a one-to-one matchmaking encryption, and has many applications such as secure data sharing and non-interactive secret handshake protocol. However, the system requires a central authority to generate encryption keys and decryption keys for all users, which could lead to key escrow problem, single-point failure and performance bottleneck. The goal of this paper is to remove any authority from the system. We propose a matchmaking encryption in public-key setting, named Public Key Matchmaking Encryption (PK-ME). We give the formal syntax and security definition of PK-ME, present a lightweight PK-ME scheme, and formally prove its security in the random model. Finally, we conduct experiments to show the practicability of the scheme. In particular, compared to the related ME schemes, our encryption and decryption are very efficient, and our PK-ME scheme has shorter parameters.</div></div>\",\"PeriodicalId\":50027,\"journal\":{\"name\":\"Journal of Systems Architecture\",\"volume\":\"167 \",\"pages\":\"Article 103492\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2025-06-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Systems Architecture\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S138376212500164X\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Systems Architecture","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S138376212500164X","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
摘要
基于身份的配对加密(identity - based Matchmaking Encryption, IB-ME)使发送方和接收方能够分别指定另一方必须满足的身份,以便显示消息。IB-ME实际上是一种一对一配对加密,具有安全数据共享和非交互式秘密握手协议等多种应用。然而,该系统需要一个中央机构为所有用户生成加密密钥和解密密钥,这可能导致密钥托管问题、单点故障和性能瓶颈。本文的目标是从系统中移除任何权限。我们提出了一种基于公钥的配对加密方法,命名为公钥配对加密(Public Key matchmaking encryption, PK-ME)。给出了PK-ME的形式化语法和安全性定义,提出了一个轻量级的PK-ME方案,并形式化地证明了其在随机模型中的安全性。最后,通过实验验证了该方案的可行性。特别是,与相关的ME方案相比,我们的加密和解密效率很高,并且我们的PK-ME方案具有更短的参数。
Efficient one-to-one sharing: Public key matchmaking encryption
Identity-Based Matchmaking Encryption (IB-ME) enables both the sender and the receiver to respectively specify an identity that the other party must satisfy, in order to reveal the messages. IB-ME is actually a one-to-one matchmaking encryption, and has many applications such as secure data sharing and non-interactive secret handshake protocol. However, the system requires a central authority to generate encryption keys and decryption keys for all users, which could lead to key escrow problem, single-point failure and performance bottleneck. The goal of this paper is to remove any authority from the system. We propose a matchmaking encryption in public-key setting, named Public Key Matchmaking Encryption (PK-ME). We give the formal syntax and security definition of PK-ME, present a lightweight PK-ME scheme, and formally prove its security in the random model. Finally, we conduct experiments to show the practicability of the scheme. In particular, compared to the related ME schemes, our encryption and decryption are very efficient, and our PK-ME scheme has shorter parameters.
期刊介绍:
The Journal of Systems Architecture: Embedded Software Design (JSA) is a journal covering all design and architectural aspects related to embedded systems and software. It ranges from the microarchitecture level via the system software level up to the application-specific architecture level. Aspects such as real-time systems, operating systems, FPGA programming, programming languages, communications (limited to analysis and the software stack), mobile systems, parallel and distributed architectures as well as additional subjects in the computer and system architecture area will fall within the scope of this journal. Technology will not be a main focus, but its use and relevance to particular designs will be. Case studies are welcome but must contribute more than just a design for a particular piece of software.
Design automation of such systems including methodologies, techniques and tools for their design as well as novel designs of software components fall within the scope of this journal. Novel applications that use embedded systems are also central in this journal. While hardware is not a part of this journal hardware/software co-design methods that consider interplay between software and hardware components with and emphasis on software are also relevant here.