Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions

被引:1
|
作者
Wu, Huangting [1 ]
Chow, Sherman S. M. [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Informat Engn, Shatin, Hong Kong, Peoples R China
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023 | 2023年 / 13906卷
关键词
identity-based encryption; hierarchical IBE; anonymity; computational Diffie-Hellman; phi-hiding; PUBLIC-KEY ENCRYPTION; IBE;
D O I
10.1007/978-3-031-33491-7_14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Dottling and Garg (CRYPTO 2017) introduced a non-black-box approach to identity-based encryption (IBE). This paves the way for the first and still the only anonymous IBE (AIBE) scheme from the computational Diffie-Hellman (CDH) assumption of Brakerski et al. (EUROCRYPT 2018). This paper revisits the blinding technique of Brakerski et al. and introduces a suite of blind primitives, extending chameleon encryption, hash encryption, and one-time signature with encryption. Using them, we propose an AIBE scheme from CDH with improved efficiency compared to Brakerski et al., especially in the decryption time. We also propose the first anonymous hierarchical IBE (AHIBE) scheme from CDH and the first AIBE and AHIBE schemes from the phi-hiding assumption, with similar efficiency as their non-anonymous counterparts.
引用
收藏
页码:366 / 395
页数:30
相关论文
共 50 条
  • [41] Efficient Identity-Based Encryption from LWR
    Cheon, Jung Hee
    Cho, Haejin
    Jung, Jaewook
    Lee, Joohee
    Lee, Keewoo
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 225 - 241
  • [42] Efficient Identity-based Encryption from Lattice
    Chen, Huiyan
    Chen, Dongmei
    Zhang, Yanshuo
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 84 - 90
  • [43] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [44] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
  • [45] Hierarchical Identity-Based Encryption with Constant-Size Private Keys
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    ETRI JOURNAL, 2012, 34 (01) : 142 - 145
  • [46] Chosen-ciphertext security from identity-based encryption
    Boneh, Dan
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    SIAM JOURNAL ON COMPUTING, 2006, 36 (05) : 1301 - 1328
  • [47] Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting
    Shiraly, Danial
    Pakniat, Nasrollah
    Eslami, Ziba
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (03): : 1 - 16
  • [48] Wildcarded Identity-Based Encryption
    Abdalla, Michel
    Birkett, James
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Schuldt, Jacob C. N.
    Smart, Nigel P.
    JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 42 - 82
  • [49] Hierarchical and Efficient Identity-based Encryption Against Side Channel Attacks
    Yu, Qihong
    Shen, Jian
    Li, Jiguo
    Ji, Sai
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 629 - 640
  • [50] Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure
    Guo, Lifeng
    Wang, Jing
    Yau, Wei-Chuen
    SYMMETRY-BASEL, 2019, 11 (07):