Relations between semantic security and anonymity in identity-based encryption

被引:3
|
作者
Herranz, Javier [1 ]
Laguillaumie, Fabien [2 ]
Rafols, Carla [1 ]
机构
[1] Univ Politecn Cataluna, Dept Matemat Aplicada 4, ES-08034 Barcelona, Spain
[2] Univ Caen Basse Normandie, GREYC, F-14032 Caen, France
关键词
Cryptography; Identity-based encryption; Selective/adaptive adversaries; Semantic security; Anonymity; DUAL SYSTEM ENCRYPTION; RANDOM ORACLES; SHORT CIPHERTEXTS; STANDARD MODEL; IBE; HIBE;
D O I
10.1016/j.ipl.2011.02.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Semantic security and anonymity are the two main properties that an identity-based encryption scheme can satisfy. Such properties can be defined in either an adaptive or a selective scenario, which differ on the moment where the attacker chooses the identity/ies that are the target of the attack. There are well-known separations between selective and adaptive semantic security on the one hand, and between selective and adaptive anonymity on the other hand. In this paper we investigate the relations between these selective and adaptive notions, for identity-based encryption schemes enjoying at the same time some security and anonymity properties. On the negative side, we prove that there is a separation between selective and adaptive anonymity even for schemes which enjoy adaptive semantic security. On the positive side, we prove that selective semantic security and adaptive anonymity imply adaptive semantic security. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:453 / 460
页数:8
相关论文
共 50 条
  • [41] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [42] Wildcarded identity-based encryption from lattices
    Minh Thuy Truc Pham
    Ngoc Ai Van Nguyen
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    THEORETICAL COMPUTER SCIENCE, 2022, 902 : 41 - 53
  • [43] Identity-Based Encryption Secure against Selective Opening Attack
    Bellare, Mihir
    Waters, Brent
    Yilek, Scott
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 235 - +
  • [44] Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions
    Wu, Huangting
    Chow, Sherman S. M.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023, 2023, 13906 : 366 - 395
  • [45] Continuous Leakage-Resilient Identity-Based Encryption with Tight Security
    Zhou, Yanwei
    Yang, Bo
    Hou, Hongxia
    Zhang, Lina
    Wang, Tao
    Hu, Mingxiao
    COMPUTER JOURNAL, 2019, 62 (08) : 1092 - 1105
  • [46] Receiver selective opening security for identity-based encryption in the multi-challenge setting
    Huang, Zhengan
    Lai, Junzuo
    Zeng, Gongxian
    Mu, Xin
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 91 (4) : 1233 - 1259
  • [47] Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities
    Chiku, Sohto
    Hara, Keisuke
    Shikata, Junji
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 299 - 314
  • [48] Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption
    Kitagawa, Fuyuki
    Tanaka, Keisuke
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 32 - 61
  • [49] Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Weng, Jian
    Zhao, Yunlei
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 77 - 92
  • [50] Anonymous Identity-Based Encryption with Identity Recovery
    Ma, Xuecheng
    Wang, Xin
    Lin, Dongdai
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 360 - 375