Efficient chosen-ciphertext secure identity-based encryption with wildcards

被引:0
|
作者
Birkett, James [1 ]
Dent, Alexander W. [1 ]
Neven, Gregory [2 ,3 ]
Schuldt, Jacob C. N. [1 ,4 ]
机构
[1] Royal Holloway Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
[2] Katholieke Univ Leuven, Dept Elect Engn, B-3001 Heverlee, Belgium
[3] Ecole normale superiure, Dept Informat, F-75005 Paris, France
[4] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
来源
INFORMATION SECURITY AND PRIVACY, PROCEEDINGS | 2007年 / 4586卷
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose new instantiations of chosen-ciphertext secure of identity-based encryption schemes with wildcards (WIBE). Our schemes outperform all existing alternatives in terms of efficiency as well as security. We achieve these results by extending the hybrid encryption (KEM-DEM) framework to the case of WIBE schemes. We propose and prove secure one generic construction in the random oracle model, and one direct construction in the standard model.
引用
收藏
页码:274 / +
页数:4
相关论文
共 50 条
  • [1] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [2] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Li, Yan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 35 - 50
  • [3] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Weiran Liu
    Jianwei Liu
    Qianhong Wu
    Bo Qin
    Yan Li
    International Journal of Information Security, 2016, 15 : 35 - 50
  • [4] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
  • [5] Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Weng, Jian
    Zhao, Yunlei
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 77 - 92
  • [6] Chosen-ciphertext security from identity-based encryption
    Boneh, Dan
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    SIAM JOURNAL ON COMPUTING, 2006, 36 (05) : 1301 - 1328
  • [7] A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme
    Ge, Chunpeng
    Wang, Jiandong
    Fang, Liming
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 347 - 360
  • [8] Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
    He, Kai
    Weng, Jian
    Liu, Jia-Nan
    Liu, Joseph K.
    Liu, Wei
    Deng, Robert H.
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 247 - 255
  • [9] Chosen-ciphertext secure hierarchical identity-based encryption from R-LWE
    Jiang, Xue-Feng
    Wang, Ting
    Sun, Zhi-Wei
    Journal of Computers (Taiwan), 2020, 31 (01) : 320 - 331
  • [10] Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman
    Galindo, David
    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 367 - 376