Generic constructions of integrated PKE and PEKS

被引:21
作者
Chen, Yu [1 ]
Zhang, Jiang [2 ]
Lin, Dongdai [1 ]
Zhang, Zhenfeng [2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
PKE-PEKS; Joint security; Consistency; Collision-freeness; Robustness; IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; CHOSEN-CIPHERTEXT SECURITY; SHORT SIGNATURES; ANONYMOUS IBE;
D O I
10.1007/s10623-014-0014-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) schemes (PKE-PEKS as shorthand). We first formalize the strongest security notion to date for PKE-PEKS schemes, named joint CCA-security. We then propose two simple constructions of jointly CCA-secure PKE-PEKS schemes from anonymous (hierarchical) identity-based encryption schemes. Besides, we also define the notion of consistency for PKE-PEKS schemes, as well as revisit its related notions (including consistency of PEKS schemes, robustness and collision-freeness of IBE schemes), which may be of independent interest.
引用
收藏
页码:493 / 526
页数:34
相关论文
共 46 条
[1]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[2]   Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions [J].
Abdalla, Michel ;
Bellare, Mihir ;
Catalano, Dario ;
Kiltz, Eike ;
Kohno, Tadayoshi ;
Lange, Tanja ;
Malone-Lee, John ;
Neven, Gregory ;
Paillier, Pascal ;
Shi, Haixia .
JOURNAL OF CRYPTOLOGY, 2008, 21 (03) :350-391
[3]  
Abdalla M, 2010, LECT NOTES COMPUT SC, V5978, P480, DOI 10.1007/978-3-642-11799-2_28
[4]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[5]  
[Anonymous], 2008423 IACR CRYPT E
[6]  
[Anonymous], 2003, IACR CRYPTOL EPRINT
[7]  
Baek J, 2006, LECT NOTES COMPUT SC, V4176, P217
[8]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[9]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[10]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615