Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption

被引:8
|
作者
Kitagawa, Fuyuki [1 ]
Tanaka, Keisuke [1 ]
机构
[1] Tokyo Inst Technol, Tokyo, Japan
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I | 2018年 / 10769卷
关键词
Identity-based encryption; Key dependent message security; Receiver selective opening security;
D O I
10.1007/978-3-319-76578-5_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct two identity-based encryption (IBE) schemes. The first one is IBE satisfying key dependent message (KDM) security for user secret keys. The second one is IBE satisfying simulation-based receiver selective opening (RSO) security. Both schemes are secure against adaptive-ID attacks and do not have any a-priori bound on the number of challenge identities queried by adversaries in the security games. They are the first constructions of IBE satisfying such levels of security. Our constructions of IBE are very simple. We construct KDM secure IBE by transforming KDM secure secret-key encryption using IBE satisfying only ordinary indistinguishability against adaptive-ID attacks (IND-ID-CPA security). Our simulation-based RSO secure IBE is based only on IND-ID-CPA secure IBE. We also demonstrate that our construction technique for KDM secure IBE is used to construct KDM secure public-key encryption. More precisely, we show how to construct KDM secure public-key encryption from KDM secure secret-key encryption and public-key encryption satisfying only ordinary indistinguishability against chosen plaintext attacks.
引用
收藏
页码:32 / 61
页数:30
相关论文
共 50 条
  • [21] Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
    Yu Chen
    LiQun Chen
    DongDai Lin
    Science China Mathematics, 2013, 56 : 1385 - 1401
  • [22] Identity-based non-interactive key distribution with forward security
    Steinwandt, Rainer
    Suarez Corona, Adriana
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 64 (1-2) : 195 - 208
  • [23] Identity-based non-interactive key distribution with forward security
    Rainer Steinwandt
    Adriana Suárez Corona
    Designs, Codes and Cryptography, 2012, 64 : 195 - 208
  • [24] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    ZHOU Yanwei
    YANG Bo
    ChineseJournalofElectronics, 2019, 28 (04) : 682 - 689
  • [25] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    Zhou Yanwei
    Yang Bo
    CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (04) : 682 - 689
  • [26] Key updating technique in identity-based encryption
    Liu, Shengli
    Long, Yu
    Chen, Kefei
    INFORMATION SCIENCES, 2011, 181 (11) : 2436 - 2440
  • [27] Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Weng, Jian
    Zhao, Yunlei
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 77 - 92
  • [28] Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
    Zhou, Yanwei
    Yang, Bo
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    THEORETICAL COMPUTER SCIENCE, 2020, 809 (809) : 277 - 295
  • [29] Comment on “Identity-based non-interactive key distribution with forward security”
    Xi Jun Lin
    Ran Ren
    Zhengang Wei
    Lin Sun
    Designs, Codes and Cryptography, 2015, 75 : 1 - 7
  • [30] Comment on "Identity-based non-interactive key distribution with forward security"
    Lin, Xi Jun
    Ren, Ran
    Wei, Zhengang
    Sun, Lin
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 75 (01) : 1 - 7