Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions

被引:1
|
作者
Wu, Huangting [1 ]
Chow, Sherman S. M. [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Informat Engn, Shatin, Hong Kong, Peoples R China
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023 | 2023年 / 13906卷
关键词
identity-based encryption; hierarchical IBE; anonymity; computational Diffie-Hellman; phi-hiding; PUBLIC-KEY ENCRYPTION; IBE;
D O I
10.1007/978-3-031-33491-7_14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Dottling and Garg (CRYPTO 2017) introduced a non-black-box approach to identity-based encryption (IBE). This paves the way for the first and still the only anonymous IBE (AIBE) scheme from the computational Diffie-Hellman (CDH) assumption of Brakerski et al. (EUROCRYPT 2018). This paper revisits the blinding technique of Brakerski et al. and introduces a suite of blind primitives, extending chameleon encryption, hash encryption, and one-time signature with encryption. Using them, we propose an AIBE scheme from CDH with improved efficiency compared to Brakerski et al., especially in the decryption time. We also propose the first anonymous hierarchical IBE (AHIBE) scheme from CDH and the first AIBE and AHIBE schemes from the phi-hiding assumption, with similar efficiency as their non-anonymous counterparts.
引用
收藏
页码:366 / 395
页数:30
相关论文
共 50 条
  • [31] Quantum-resistant anonymous identity-based encryption with trable identities
    Liu, Zi-Yuan
    Tseng, Yi-Fan
    Tso, Raylin
    Mambo, Masahiro
    Chen, Yu-Chi
    IET INFORMATION SECURITY, 2022, 16 (02) : 111 - 126
  • [32] Efficient identity-based encryption with Hierarchical key-insulation from HIBE
    Emura, Keita
    Takayasu, Atsushi
    Watanabe, Yohei
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (10) : 2397 - 2431
  • [33] Revocable hierarchical identity-based encryption with shorter private keys and update keys
    Lee, Kwangsu
    Park, Seunghwan
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (10) : 2407 - 2440
  • [34] A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
    Lee, Kwangsu
    Kim, Joon Sik
    IEEE ACCESS, 2022, 10 : 44178 - 44199
  • [35] Anonymous identity-based broadcast encryption technology for smart city information system
    Kai He
    Jian Weng
    Yijun Mao
    Huaqiang Yuan
    Personal and Ubiquitous Computing, 2017, 21 : 841 - 853
  • [36] Anonymous identity-based broadcast encryption technology for smart city information system
    He, Kai
    Weng, Jian
    Mao, Yijun
    Yuan, Huaqiang
    PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 841 - 853
  • [37] Backward Compatible Identity-Based Encryption
    Kim, Jongkil
    SENSORS, 2023, 23 (09)
  • [38] A Framework for Identity-Based Encryption with Almost Tight Security
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Yamada, Shota
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 521 - 549
  • [39] Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems
    Yan, Zhen
    Qu, Haipeng
    Zhang, Xiaoshuai
    Xu, Jian-Liang
    Lin, Xi-Jun
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [40] Wildcarded identity-based encryption from lattices
    Minh Thuy Truc Pham
    Ngoc Ai Van Nguyen
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    THEORETICAL COMPUTER SCIENCE, 2022, 902 : 41 - 53