Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions

被引:1
|
作者
Wu, Huangting [1 ]
Chow, Sherman S. M. [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Informat Engn, Shatin, Hong Kong, Peoples R China
关键词
identity-based encryption; hierarchical IBE; anonymity; computational Diffie-Hellman; phi-hiding; PUBLIC-KEY ENCRYPTION; IBE;
D O I
10.1007/978-3-031-33491-7_14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Dottling and Garg (CRYPTO 2017) introduced a non-black-box approach to identity-based encryption (IBE). This paves the way for the first and still the only anonymous IBE (AIBE) scheme from the computational Diffie-Hellman (CDH) assumption of Brakerski et al. (EUROCRYPT 2018). This paper revisits the blinding technique of Brakerski et al. and introduces a suite of blind primitives, extending chameleon encryption, hash encryption, and one-time signature with encryption. Using them, we propose an AIBE scheme from CDH with improved efficiency compared to Brakerski et al., especially in the decryption time. We also propose the first anonymous hierarchical IBE (AHIBE) scheme from CDH and the first AIBE and AHIBE schemes from the phi-hiding assumption, with similar efficiency as their non-anonymous counterparts.
引用
收藏
页码:366 / 395
页数:30
相关论文
共 50 条
  • [1] Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 45 - 56
  • [2] Anonymous hierarchical identity-based encryption (Without random oracles)
    Boyen, Xavier
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 290 - 307
  • [3] Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    [J]. PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 215 - +
  • [4] Anonymous Identity-Based Encryption with Identity Recovery
    Ma, Xuecheng
    Wang, Xin
    Lin, Dongdai
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 360 - 375
  • [5] Anonymous hierarchical identity-based encryption without key delegation in decryption
    Luo, Song
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 306 - 317
  • [6] Anonymous Multireceiver Identity-Based Encryption
    Fan, Chun-I
    Huang, Ling-Ying
    Ho, Pei-Hsiu
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (09) : 1239 - 1249
  • [7] Identity-Based Matchmaking Encryption from Standard Assumptions
    Chen, Jie
    Li, Yu
    Wen, Jinming
    Weng, Jian
    [J]. ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 394 - 422
  • [8] Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities
    Nguyen, Ngoc Ai Van
    Pham, Minh Thuy Truc
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 84
  • [9] Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys
    Zhang, Leyou
    Mu, Yi
    Wu, Qing
    [J]. COMPUTER JOURNAL, 2016, 59 (04): : 452 - 461
  • [10] Identity-Based Matchmaking Encryption from Standard Lattice Assumptions
    Belfiore, Roberta Cimorelli
    De Cosmo, Andrea
    Ferrara, Anna Lisa
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT II, 2024, 14584 : 163 - 188