Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions

被引:1
|
作者
Wu, Huangting [1 ]
Chow, Sherman S. M. [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Informat Engn, Shatin, Hong Kong, Peoples R China
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023 | 2023年 / 13906卷
关键词
identity-based encryption; hierarchical IBE; anonymity; computational Diffie-Hellman; phi-hiding; PUBLIC-KEY ENCRYPTION; IBE;
D O I
10.1007/978-3-031-33491-7_14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Dottling and Garg (CRYPTO 2017) introduced a non-black-box approach to identity-based encryption (IBE). This paves the way for the first and still the only anonymous IBE (AIBE) scheme from the computational Diffie-Hellman (CDH) assumption of Brakerski et al. (EUROCRYPT 2018). This paper revisits the blinding technique of Brakerski et al. and introduces a suite of blind primitives, extending chameleon encryption, hash encryption, and one-time signature with encryption. Using them, we propose an AIBE scheme from CDH with improved efficiency compared to Brakerski et al., especially in the decryption time. We also propose the first anonymous hierarchical IBE (AHIBE) scheme from CDH and the first AIBE and AHIBE schemes from the phi-hiding assumption, with similar efficiency as their non-anonymous counterparts.
引用
收藏
页码:366 / 395
页数:30
相关论文
共 50 条
  • [1] Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 45 - 56
  • [2] Anonymous Multireceiver Identity-Based Encryption
    Fan, Chun-I
    Huang, Ling-Ying
    Ho, Pei-Hsiu
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (09) : 1239 - 1249
  • [3] Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys
    Zhang, Leyou
    Mu, Yi
    Wu, Qing
    COMPUTER JOURNAL, 2016, 59 (04) : 452 - 461
  • [4] Anonymous Identity-Based Encryption with Identity Recovery
    Ma, Xuecheng
    Wang, Xin
    Lin, Dongdai
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 360 - 375
  • [5] Anonymous hierarchical identity-based encryption without key delegation in decryption
    Luo, Song
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 306 - 317
  • [6] Identity-Based Matchmaking Encryption from Standard Assumptions
    Chen, Jie
    Li, Yu
    Wen, Jinming
    Weng, Jian
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 394 - 422
  • [7] Anonymous Lattice Identity-Based Encryption with Traceable Identities
    Boyen, Xavier
    Foo, Ernest
    Li, Qinyi
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 630 - 649
  • [8] Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities
    Nguyen, Ngoc Ai Van
    Pham, Minh Thuy Truc
    COMPUTER STANDARDS & INTERFACES, 2023, 84
  • [9] Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems
    Liu, Zi-Yuan
    Mambo, Masahiro
    Tso, Raylin
    Tseng, Yi-Fan
    COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [10] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62