On the Feasibility of Identity-Based Encryption with Equality Test Against Insider Attacks

被引:1
作者
Emura, Keita [1 ]
机构
[1] Kanazawa Univ, Kanazawa, Ishikawa, Japan
来源
INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024 | 2024年 / 14895卷
关键词
Identity-based encryption with equality test against insider attacks; Searchable Encryption; Generic Construction; PUBLIC-KEY ENCRYPTION; EFFICIENT; SECURE;
D O I
10.1007/978-981-97-5025-2_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with equality test, proposed by Yang et al. (CT-RSA 2010), allows anyone to check whether two ciphertexts of distinct public keys are encryptions of the same plaintext or not using trapdoors, and identity-based encryption with equality test (IBEET) is its identity-based variant. As a variant of IBEET, IBEET against insider attacks (IBEETIA) was proposed by Wu et al. (ACISP 2017), where a token is defined for each identity and is used for encryption. Lee et al. (ACISP 2018) and Duong et al. (ProvSec 2019) proposed IBEETIA schemes constructed by identity-based encryption (IBE) related complexity assumptions. Later, Emura and Takayasu (IEICE Transactions 2023) demonstrated that symmetric key encryption and pseudo-random permutations are sufficient to construct IBEETIA which is secure in the previous security definition. In this paper, we demonstrate a sufficient condition that IBEETIA implies IBE. We define one-wayness against chosen-plaintext/ciphertext attacks for the token generator (OW-TG-CPA/CCA) and for token holders (OW-TH-CPA/CCA), which were not considered in the previous security definition. We show that OW-TG-CPA secure IBEETIA with additional conditions implies OW-CPA secure IBE. On the other hand, we propose a generic construction of OW-THCCA secure IBEETIA from public key encryption. Our results suggest a design principle to efficiently construct IBEETIA without employing IBE-related complexity assumptions.
引用
收藏
页码:261 / 280
页数:20
相关论文
共 36 条
  • [1] Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
  • [2] More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model
    Asano, Kyoichi
    Emura, Keita
    Takayasu, Atsushi
    [J]. INFORMATION SECURITY, ISC 2022, 2022, 13640 : 75 - 83
  • [3] A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality Test
    Asano, Kyoichi
    Emura, Keita
    Takayasu, Atsushi
    Watanabe, Yohei
    [J]. PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 3 - 19
  • [4] Baek J, 2005, LECT NOTES COMPUT SC, V3439, P386
  • [5] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [6] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [7] On The Impossibility of Basing Identity Based Encryption on Trapdoor Permutations
    Boneh, Dan
    Papakonstantinou, Periklis A.
    Rackoff, Charles
    Vahlis, Yevgeniy
    Waters, Brent
    [J]. PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, : 283 - +
  • [8] CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM
    Bos, Joppe
    Ducas, Leo
    Kiltz, Eike
    Lepoint, Tancrede
    Lyubashevsky, Vadim
    Schanck, John M.
    Schwabe, Peter
    Seiler, Gregor
    Stehle, Damien
    [J]. 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 353 - 367
  • [9] Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions
    Brakerski, Zvika
    Lombardi, Alex
    Segev, Gil
    Vaikuntanathan, Vinod
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I, 2018, 10820 : 535 - 564
  • [10] Chow SSM, 2007, LECT NOTES COMPUT SC, V4779, P315