A Generic Construction of CCA-secure Identity-based Encryption with Equality Test against Insider Attacks

被引:0
|
作者
Emura, Keita [1 ]
Takayasu, Atsushi [2 ]
机构
[1] Univ Tokyo, Bunkyo Ku, 7-3-1 Hongo, Tokyo 1130033, Japan
[2] Natl Inst Informat & Commun Technol, 4-2-1 Nukui Kitamachi, Koganei, Tokyo 1848795, Japan
关键词
identity-based encryption; equality test; insider attacks; CCA security; generic construction;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption with equality test (IBEET) is a generalization of the traditional identity-based encryption (IBE) and public key searchable encryption, where trapdoors enable users to check whether two ciphertexts of distinct identities are encryptions of the same plaintext. By definition, IBEET cannot achieve indistinguishability security against insiders, i.e., users who have trapdoors. To address this issue, IBEET against insider attacks (IBEETIA) was later introduced as a dual primitive. While all users of IBEETIA are able to check whether two ciphertexts are encryptions of the same plaintext, only users who have tokens are able to encrypt plaintexts. Hence, IBEETIA is able to achieve indistinguishability security. On the other hand, the definition of IBEETIA weakens the notion of IBE due to its encryption inability. Nevertheless, known schemes of IBEETIA made use of rich algebraic structures such as bilinear groups and lattices. In this paper, we propose a generic construction of IBEETIA without resorting to rich algebraic structures. In particular, the only building blocks of the proposed construction are symmetric key encryption and pseudo-random permutations in the standard model. If a symmetric key encryption scheme satisfies CCA security, our proposed IBEETIA scheme also satisfies CCA security.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Practical continuous leakage-resilient CCA secure identity-based encryption
    Yanwei Zhou
    Bo Yang
    Frontiers of Computer Science, 2020, 14
  • [32] CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System
    Chen, Yu
    Zhang, Zongyang
    Lin, Dongdai
    Cao, Zhenfu
    COMPUTER JOURNAL, 2014, 57 (10): : 1537 - 1556
  • [33] Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement
    Liao, Yongjian
    Fan, Yu
    Liang, Yikuan
    Liu, Yulu
    Mohammed, Ramadan
    IEEE ACCESS, 2019, 7 : 75067 - 75072
  • [34] An Efficient Identity-Based Encryption With Equality Test in Cloud Computing
    Yang, Zhichao
    He, Debiao
    Qu, Longjiang
    Ye, Qing
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2983 - 2992
  • [35] Identity-based encryption with outsourced equality test in cloud computing
    Ma, Sha
    INFORMATION SCIENCES, 2016, 328 : 389 - 402
  • [36] Identity-Based Encryption Secure against Selective Opening Attack
    Bellare, Mihir
    Waters, Brent
    Yilek, Scott
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 235 - +
  • [37] Secure and practical identity-based encryption
    Naccache, D.
    IET INFORMATION SECURITY, 2007, 1 (02) : 59 - 64
  • [38] CCA-Secure Leveled FHE From Multi-Identity Fully Homomorphic Encryption
    Wang, Weili
    Hu, Bin
    Zhao, Xiufeng
    PROCEEDINGS OF THE 2017 2ND JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING CONFERENCE (JIMEC 2017), 2017, 62 : 512 - 516
  • [39] A generic construction for revocable identity-based encryption with subset difference methods
    Lee, Kwangsu
    PLOS ONE, 2020, 15 (09):
  • [40] Efficient Identity-Based Encryption Scheme with Equality Test in Smart City
    Wu, Libing
    Zhang, Yubo
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2018, 3 (01): : 44 - 55