Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption

被引:8
|
作者
Kitagawa, Fuyuki [1 ]
Tanaka, Keisuke [1 ]
机构
[1] Tokyo Inst Technol, Tokyo, Japan
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I | 2018年 / 10769卷
关键词
Identity-based encryption; Key dependent message security; Receiver selective opening security;
D O I
10.1007/978-3-319-76578-5_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct two identity-based encryption (IBE) schemes. The first one is IBE satisfying key dependent message (KDM) security for user secret keys. The second one is IBE satisfying simulation-based receiver selective opening (RSO) security. Both schemes are secure against adaptive-ID attacks and do not have any a-priori bound on the number of challenge identities queried by adversaries in the security games. They are the first constructions of IBE satisfying such levels of security. Our constructions of IBE are very simple. We construct KDM secure IBE by transforming KDM secure secret-key encryption using IBE satisfying only ordinary indistinguishability against adaptive-ID attacks (IND-ID-CPA security). Our simulation-based RSO secure IBE is based only on IND-ID-CPA secure IBE. We also demonstrate that our construction technique for KDM secure IBE is used to construct KDM secure public-key encryption. More precisely, we show how to construct KDM secure public-key encryption from KDM secure secret-key encryption and public-key encryption satisfying only ordinary indistinguishability against chosen plaintext attacks.
引用
收藏
页码:32 / 61
页数:30
相关论文
共 50 条
  • [1] Receiver selective opening security for identity-based encryption in the multi-challenge setting
    Zhengan Huang
    Junzuo Lai
    Gongxian Zeng
    Xin Mu
    Designs, Codes and Cryptography, 2023, 91 : 1233 - 1259
  • [2] Receiver selective opening security for identity-based encryption in the multi-challenge setting
    Huang, Zhengan
    Lai, Junzuo
    Zeng, Gongxian
    Mu, Xin
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 91 (4) : 1233 - 1259
  • [3] Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption
    Hara, Keisuke
    Matsuda, Takahiro
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (03) : 160 - 172
  • [4] KDM security for identity-based encryption: Constructions and separations
    Chen, Yu
    Zhang, Jiang
    Deng, Yi
    Chang, Jinyong
    INFORMATION SCIENCES, 2019, 486 : 450 - 473
  • [5] Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security
    Fan, Chun-I
    Tseng, Yi-Fan
    SYMMETRY-BASEL, 2015, 7 (04): : 1856 - 1881
  • [6] A separation between selective and full-identity security notions for identity-based encryption
    Galindo, D
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 318 - 326
  • [7] A Note on the Security Proof of Waters Identity-Based Encryption
    Hui, Jianbin
    Wang, Huaixi
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL III, 2010, : 420 - 423
  • [8] Efficient identity-based encryption with tight security reduction
    Attrapadung, Nuttapong
    Furukawa, Jun
    Gomi, Takeshi
    Hanaoka, Goichiro
    Imai, Hideki
    Zhang, Rui
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (09) : 1803 - 1813
  • [9] A Framework for Identity-Based Encryption with Almost Tight Security
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Yamada, Shota
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 521 - 549
  • [10] Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
    Paterson, Kenneth G.
    Srinivasan, Sriramkrishnan
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2008, 2008, 5209 : 354 - 375