Relations between semantic security and anonymity in identity-based encryption

被引:3
|
作者
Herranz, Javier [1 ]
Laguillaumie, Fabien [2 ]
Rafols, Carla [1 ]
机构
[1] Univ Politecn Cataluna, Dept Matemat Aplicada 4, ES-08034 Barcelona, Spain
[2] Univ Caen Basse Normandie, GREYC, F-14032 Caen, France
关键词
Cryptography; Identity-based encryption; Selective/adaptive adversaries; Semantic security; Anonymity; DUAL SYSTEM ENCRYPTION; RANDOM ORACLES; SHORT CIPHERTEXTS; STANDARD MODEL; IBE; HIBE;
D O I
10.1016/j.ipl.2011.02.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Semantic security and anonymity are the two main properties that an identity-based encryption scheme can satisfy. Such properties can be defined in either an adaptive or a selective scenario, which differ on the moment where the attacker chooses the identity/ies that are the target of the attack. There are well-known separations between selective and adaptive semantic security on the one hand, and between selective and adaptive anonymity on the other hand. In this paper we investigate the relations between these selective and adaptive notions, for identity-based encryption schemes enjoying at the same time some security and anonymity properties. On the negative side, we prove that there is a separation between selective and adaptive anonymity even for schemes which enjoy adaptive semantic security. On the positive side, we prove that selective semantic security and adaptive anonymity imply adaptive semantic security. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:453 / 460
页数:8
相关论文
共 50 条
  • [31] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    ZHOU Yanwei
    YANG Bo
    ChineseJournalofElectronics, 2019, 28 (04) : 682 - 689
  • [32] Identity-based matchmaking encryption with stronger security and instantiation on lattices
    Wang, Yuejun
    Wang, Baocang
    Lai, Qiqi
    Zhan, Yu
    THEORETICAL COMPUTER SCIENCE, 2025, 1029
  • [33] Continuous Leakage-Resilient Identity-Based Encryption Scheme with CCA Security
    Zhou Yanwei
    Yang Bo
    CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (04) : 682 - 689
  • [34] Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 45 - 56
  • [35] Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption
    Zhou, Yanwei
    Wang, Zhaolong
    Qiao, Zirui
    Wang, Ying
    Yang, Bo
    Mu, Yi
    Zhang, Mingwu
    COMPUTER JOURNAL, 2023, 66 (04) : 924 - 940
  • [36] New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
    Park, Jong Hwan
    Lee, Kwangsu
    Lee, Dong Hoon
    INFORMATION SCIENCES, 2015, 325 : 256 - 270
  • [37] Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks
    Sun, Shi-Feng
    Gu, Dawu
    Huang, Zhengan
    COMPUTER JOURNAL, 2015, 58 (10) : 2520 - 2536
  • [38] Wildcarded Identity-Based Encryption
    Abdalla, Michel
    Birkett, James
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Schuldt, Jacob C. N.
    Smart, Nigel P.
    JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 42 - 82
  • [39] Idealizing Identity-Based Encryption
    Hofheinz, Dennis
    Matt, Christian
    Maurer, Ueli
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 495 - 520
  • [40] Wildcarded Identity-Based Encryption
    Michel Abdalla
    James Birkett
    Dario Catalano
    Alexander W. Dent
    John Malone-Lee
    Gregory Neven
    Jacob C. N. Schuldt
    Nigel P. Smart
    Journal of Cryptology, 2011, 24 : 42 - 82