Relations between semantic security and anonymity in identity-based encryption

被引:3
|
作者
Herranz, Javier [1 ]
Laguillaumie, Fabien [2 ]
Rafols, Carla [1 ]
机构
[1] Univ Politecn Cataluna, Dept Matemat Aplicada 4, ES-08034 Barcelona, Spain
[2] Univ Caen Basse Normandie, GREYC, F-14032 Caen, France
关键词
Cryptography; Identity-based encryption; Selective/adaptive adversaries; Semantic security; Anonymity; DUAL SYSTEM ENCRYPTION; RANDOM ORACLES; SHORT CIPHERTEXTS; STANDARD MODEL; IBE; HIBE;
D O I
10.1016/j.ipl.2011.02.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Semantic security and anonymity are the two main properties that an identity-based encryption scheme can satisfy. Such properties can be defined in either an adaptive or a selective scenario, which differ on the moment where the attacker chooses the identity/ies that are the target of the attack. There are well-known separations between selective and adaptive semantic security on the one hand, and between selective and adaptive anonymity on the other hand. In this paper we investigate the relations between these selective and adaptive notions, for identity-based encryption schemes enjoying at the same time some security and anonymity properties. On the negative side, we prove that there is a separation between selective and adaptive anonymity even for schemes which enjoy adaptive semantic security. On the positive side, we prove that selective semantic security and adaptive anonymity imply adaptive semantic security. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:453 / 460
页数:8
相关论文
共 50 条
  • [1] On the Anonymity of Identity-Based Encryption
    Luo, Song
    Hu, Ning
    JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [2] Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
    Paterson, Kenneth G.
    Srinivasan, Sriramkrishnan
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2008, 2008, 5209 : 354 - 375
  • [3] Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition
    Hanaoka, Goichiro
    Komatsu, Misaki
    Ohara, Kazuma
    Sakai, Yusuke
    Yamada, Shota
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 65 - 85
  • [4] A Framework for Identity-Based Encryption with Almost Tight Security
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Yamada, Shota
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 521 - 549
  • [5] Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
    Zhang, Yinghui
    Yang, Menglei
    Zheng, Dong
    Zhang, Tiantian
    Guo, Rui
    Ren, Fang
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 665 - 681
  • [6] Revocable hierarchical identity-based encryption with shorter private keys and update keys
    Lee, Kwangsu
    Park, Seunghwan
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (10) : 2407 - 2440
  • [8] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62
  • [9] Identity-Based Matchmaking Encryption from Standard Assumptions
    Chen, Jie
    Li, Yu
    Wen, Jinming
    Weng, Jian
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 394 - 422
  • [10] A separation between selective and full-identity security notions for identity-based encryption
    Galindo, D
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 318 - 326