An efficient incomparable public key encryption scheme

Hyang Sook Lee, Seongan Lim

Research output: Contribution to journalArticlepeer-review

3 Scopus citations


Public keys are closely related to the identity of recipients in public key encryption setting. In privacy-sensitive applications of public key encryption, it is desirable to hide the relation between the public key and the identity of the recipient. The main functional approach in the privacy enhanced public key encryption scheme is to give anonymity of the public keys of recipients. In this case, all the users in the system are potential recipients of every ciphertext. Waters, Felten, and Sahai proposed an incomparable public key encryption scheme which guarantees the anonymity of recipients against both eavesdroppers and senders. In their scheme, all the recipients must complete the same amount of computations to identify the ciphertexts which direct to them. In this paper, we focus on reducing the number of computations for the recipients while preserving the security level of Waters et al.'s scheme. Our method is to separate the decryption process into two steps, first the recipient determines whether a ciphertext is directed to him or her, and only if the direction is correct, the recipient recovers the corresponding plaintext. This improves the efficiency of the system.

Original languageEnglish
Pages (from-to)3066-3072
Number of pages7
JournalInformation Sciences
Issue number14
StatePublished - 15 Jul 2011

Bibliographical note

Funding Information:
This work was supported by the Priority Research Centers Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology ( 2009-0093827 ).


  • Anonymity
  • Incomparable public keys
  • Key privacy
  • Public key encryption scheme


Dive into the research topics of 'An efficient incomparable public key encryption scheme'. Together they form a unique fingerprint.

Cite this