In current multi-hop unidirectional identity-based proxy re-encryption schemes, the ciphertext length increases with the number of hops, which leads to the reduction of efficiency. To solve this issue, a new multi-hop unidirectional identity-based proxy re-encryption scheme was designed by changing the re-encryption key generation side. The re-encryption keys were generated by the sender. In the scheme, the first-level and second-level ciphertexts were of the same pattern, and the length of the re-encrypted ciphertext remained unchanged. The efficiency analysis shows that the proposed scheme reduces the numbers of exponent, multiplication, and bilinear pairing computations. The new scheme has been proved to be chosen-ciphertext attack secure in the random oracle model based on the Decisional Bilinear Diffie-Hellman (DBDH) assumption.
Concerning the problem that it is hard to construct digital signature scheme in the standard model, a new signature scheme was proposed, based on Chosen Ciphertext Attack (CCA) secure Publicly Verifiable Public Key Encryption (PVPKE). The construction is based on the following facts: public verifiability is required in both signature scheme and PVPKE scheme; signatures in signature scheme can not be malleable, and ciphertexts in CCA secure PVPKE scheme can not also be malleable. To design the scheme, private key in PVPKE scheme was used to sign, and the public key was used to verify. Security proof was also given. Analysis result indicates that the proposed scheme has good application in the mail transfer system.
To solve the problem that some video steganography algorithms based on Motion Vector (MV) change statistical features of histogram, a new video steganography algorithm based on keeping histogram of MV was proposed. In this paper, the secret information were hidden in video MV by using the data mapping of histogram. At the same time, a code-matching method was used to encode the secret information before being embedded, then the data stream would have the same statistical characteristics by MV, which made the scheme absolutely secure in theory. The experimental results show that: the change of histogram features is effectively controlled, the increment of bitrate is controlled in 1%, and the steganalysis detection rate is decreased by an average of 30% to 50%.