Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption

被引:8
|
作者
Kitagawa, Fuyuki [1 ]
Tanaka, Keisuke [1 ]
机构
[1] Tokyo Inst Technol, Tokyo, Japan
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I | 2018年 / 10769卷
关键词
Identity-based encryption; Key dependent message security; Receiver selective opening security;
D O I
10.1007/978-3-319-76578-5_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct two identity-based encryption (IBE) schemes. The first one is IBE satisfying key dependent message (KDM) security for user secret keys. The second one is IBE satisfying simulation-based receiver selective opening (RSO) security. Both schemes are secure against adaptive-ID attacks and do not have any a-priori bound on the number of challenge identities queried by adversaries in the security games. They are the first constructions of IBE satisfying such levels of security. Our constructions of IBE are very simple. We construct KDM secure IBE by transforming KDM secure secret-key encryption using IBE satisfying only ordinary indistinguishability against adaptive-ID attacks (IND-ID-CPA security). Our simulation-based RSO secure IBE is based only on IND-ID-CPA secure IBE. We also demonstrate that our construction technique for KDM secure IBE is used to construct KDM secure public-key encryption. More precisely, we show how to construct KDM secure public-key encryption from KDM secure secret-key encryption and public-key encryption satisfying only ordinary indistinguishability against chosen plaintext attacks.
引用
收藏
页码:32 / 61
页数:30
相关论文
共 50 条
  • [31] Secure Symmetric Key Fuzzy Identity-Based Encryption
    Liu, Pengtao
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2665 - 2668
  • [32] QUANTUM-SAFE IDENTITY-BASED BROADCAST ENCRYPTION WITH PROVABLE SECURITY FROM MULTIVARIATE CRYPTOGRAPHY
    Sarkar, Ramprasad
    Mandal, Mriganka
    Mukhopadhyay, Sourav
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2024, 18 (03) : 814 - 827
  • [33] Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing
    Kim, Jongkil
    Camtepe, Seyit
    Susilo, Willy
    Nepal, Surya
    Baek, Joonsang
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 55 - 66
  • [34] CCA Security and Trapdoor Functions via Key-Dependent-Message Security
    Kitagawa, Fuyuki
    Matsuda, Takahiro
    Tanaka, Keisuke
    JOURNAL OF CRYPTOLOGY, 2022, 35 (02)
  • [35] CCA Security and Trapdoor Functions via Key-Dependent-Message Security
    Fuyuki Kitagawa
    Takahiro Matsuda
    Keisuke Tanaka
    Journal of Cryptology, 2022, 35
  • [36] CCA Security and Trapdoor Functions via Key-Dependent-Message Security
    Kitagawa, Fuyuki
    Matsuda, Takahiro
    Tanaka, Keisuke
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 33 - 64
  • [37] New application of partitioning methodology: identity-based dual receiver encryption
    Zhang, Kai
    Chen, Wen
    Li, Xiangxue
    Chen, Jie
    Qian, Haifeng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5789 - 5802
  • [38] Secure identity-based encryption: overcoming the key escrow challenge
    Afroaz, Khaleda
    Rao, Y.V. Subba
    Rekha, N. Rukma
    International Journal of Security and Networks, 2024, 19 (02) : 55 - 62
  • [39] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    ZHU Yan
    WANG Shanbiao
    MA Di
    FENG Rongquan
    Chinese Journal of Electronics, 2014, 23 (04) : 842 - 850
  • [40] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    Zhu Yan
    Wang Shanbiao
    Ma Di
    Feng Rongquan
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 842 - 850