Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme

被引:0
作者
CHEN Yu [1 ]
CHEN LiQun [2 ]
LIN DongDai [1 ]
机构
[1] State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering, Chinese Academy of Sciences
[2] Hewlett Packard Labs,Long Down Avenue, Stoke Gifford, Bristol, BS34 8QZ, UK
基金
国家重点基础研究发展计划(973计划); 中国国家自然科学基金;
关键词
identity-based encryption; Fujisaki-Okamoto transformation; provable security; cascading reduction;
D O I
暂无
中图分类号
TP309.7 [加密与解密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash functions of the original BF-IBE. Compared with prior proofs, our new proof provides a tighter security reduction and minimizes the use of random oracles, thus indicates BF-IBE has better provable security with our new choices of hash functions. The techniques developed in our proof can also be applied to improving security analysis of some other IBE schemes. As an independent technical contribution, we also give a rigorous proof of the Fujisaki-Okamoto (FO) transformation in the case of CPA-to-CCA, which demonstrates the efficiency of the FO-transformation (CPA-to-CCA), in terms of the tightness of security reduction, has long been underestimated. This result can remarkably benefit the security proofs of encryption schemes using the FO-transformation for CPA-to-CCA enhancement.
引用
收藏
页码:1385 / 1401
页数:17
相关论文
共 1 条
  • [1] Random oracles are practical: A paradigm for designing efficient protocols .2 Bellare M,Rogaway P. Proceedings of the 1st ACM conference on Computer and communications security . 1993