Efficient hybrid encryption from ID-based encryption

被引:13
作者
Abe, Masayuki [1 ]
Cui, Yang [2 ]
Imai, Hideki [3 ]
Kiltz, Eike [4 ]
机构
[1] Nippon Telegraph & Tel Corp, Informat Sharing Platform Labs, Tokyo 1808585, Japan
[2] AIST, Res Ctr Informat Secur, Chiyoda Ku, Tokyo 1010021, Japan
[3] Chuo Univ, Bunkyo Ku, Tokyo 1128551, Japan
[4] CWI Amsterdam, NL-1090 GB Amsterdam, Netherlands
基金
日本学术振兴会;
关键词
Hybrid Encryption; Selective-ID; KEM; Threshold PKE; Chameleon hash; IDENTITY-BASED ENCRYPTION; CHOSEN-CIPHERTEXT SECURITY; KEY ENCAPSULATION; ADAPTIVELY-SECURE; CRYPTOSYSTEMS;
D O I
10.1007/s10623-009-9320-0
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until now is by Boneh and Katz and requires roughly 704-bit overhead in the ciphertext. We present new generic transformations that are applicable to partitioned IBKEMs. A partitioned IBKEM is an IBKEM that provides some extra structure. Such IBKEMs are quite natural and in fact nearly all known IBKEMs have this additional property. Our first transformation yields chosen-ciphertext secure PKE schemes from selective-ID secure partitioned IBKEMs with a 256-bit overhead in ciphertext size plus one extra exponentiation in encryption/decryption. As the central tool a Chameleon Hash function is used to map the identities. We also propose other methods to remove the use of Chameleon Hash, which may be of independent technical interest. Applying our transformations to existing IBKEMs we propose a number of novel PKE schemes with different trade-offs. In some concrete instantiations the Chameleon Hash can be made "implicit" which results in improved efficiency by eliminating the additional exponentiation. Since our transformations preserve the public verifiability property of the IBE schemes it is possible to extend our results to build threshold hybrid PKE schemes. We show an analogue generic transformation in the threshold setting and present a concrete scheme which results in the most efficient threshold PKE scheme in the standard model.
引用
收藏
页码:205 / 240
页数:36
相关论文
共 47 条
[1]  
Abe M, 2004, LECT NOTES COMPUT SC, V3152, P317
[2]  
Abe M., 1999, CRYPTO, P130
[3]   Tag-KEM/DEM: A new framework for hybrid encryption [J].
Abe, Masayuki ;
Gennaro, Rosario ;
Kurosawa, Kaoru .
JOURNAL OF CRYPTOLOGY, 2008, 21 (01) :97-130
[4]  
[Anonymous], 2004165 CRYPT EPRINT
[5]  
[Anonymous], P ICISC 2005
[6]  
[Anonymous], LECT NOTES COMPUT SC
[7]  
[Anonymous], 30 ANN ACM S THEOR C
[8]  
[Anonymous], SIAM J COMPUT
[9]  
[Anonymous], ACNS 2007
[10]  
[Anonymous], 21 ANN ACM S THEOR C