A Generic Construction of CCA-secure Identity-based Encryption with Equality Test against Insider Attacks

被引:0
|
作者
Emura, Keita [1 ]
Takayasu, Atsushi [2 ]
机构
[1] Univ Tokyo, Bunkyo Ku, 7-3-1 Hongo, Tokyo 1130033, Japan
[2] Natl Inst Informat & Commun Technol, 4-2-1 Nukui Kitamachi, Koganei, Tokyo 1848795, Japan
关键词
identity-based encryption; equality test; insider attacks; CCA security; generic construction;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption with equality test (IBEET) is a generalization of the traditional identity-based encryption (IBE) and public key searchable encryption, where trapdoors enable users to check whether two ciphertexts of distinct identities are encryptions of the same plaintext. By definition, IBEET cannot achieve indistinguishability security against insiders, i.e., users who have trapdoors. To address this issue, IBEET against insider attacks (IBEETIA) was later introduced as a dual primitive. While all users of IBEETIA are able to check whether two ciphertexts are encryptions of the same plaintext, only users who have tokens are able to encrypt plaintexts. Hence, IBEETIA is able to achieve indistinguishability security. On the other hand, the definition of IBEETIA weakens the notion of IBE due to its encryption inability. Nevertheless, known schemes of IBEETIA made use of rich algebraic structures such as bilinear groups and lattices. In this paper, we propose a generic construction of IBEETIA without resorting to rich algebraic structures. In particular, the only building blocks of the proposed construction are symmetric key encryption and pseudo-random permutations in the standard model. If a symmetric key encryption scheme satisfies CCA security, our proposed IBEETIA scheme also satisfies CCA security.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] A Generic Construction of CCA-Secure Identity-Based Encryption with Equality Test against Insider Attacks
    Emura, Keita
    Takayasu, Atsushi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2023, E106A (03) : 193 - 202
  • [2] A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality Test
    Asano, Kyoichi
    Emura, Keita
    Takayasu, Atsushi
    Watanabe, Yohei
    [J]. PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 3 - 19
  • [3] Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction
    Baek, Joonsang
    Wong, Duncan S.
    Li, Jin
    Au, Man Ho
    [J]. COMPUTER JOURNAL, 2016, 59 (04): : 508 - 521
  • [4] On the Feasibility of Identity-Based Encryption with Equality Test Against Insider Attacks
    Emura, Keita
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 261 - 280
  • [5] CCA-Secure Deterministic Identity-Based Encryption Scheme
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Liang, Kaitai
    Xue, Liang
    Yang, Xiaoyi
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 245 - 269
  • [6] Constructions of CCA-Secure Revocable Identity-Based Encryption
    Ishida, Yuu
    Watanabe, Yohei
    Shikata, Junji
    [J]. INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 174 - 191
  • [7] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Han, Shuai
    Liu, Shengli
    Qin, Baodong
    Gu, Dawu
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (03) : 517 - 554
  • [8] A generic construction of CCA-secure deterministic encryption
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Wang, Xin
    Zhou, Yanwei
    Xia, Zhe
    [J]. INFORMATION PROCESSING LETTERS, 2020, 154
  • [9] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Shuai Han
    Shengli Liu
    Baodong Qin
    Dawu Gu
    [J]. Designs, Codes and Cryptography, 2018, 86 : 517 - 554
  • [10] Lattice-Based Cryptoprocessor for CCA-Secure Identity-Based Encryption
    Renteria-Mejia, Claudia P.
    Velasco-Medina, Jaime
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2020, 67 (07) : 2331 - 2344