Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme

被引:0
|
作者
CHEN Yu [1 ]
CHEN LiQun [2 ]
LIN DongDai [1 ]
机构
[1] State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering, Chinese Academy of Sciences
[2] Hewlett Packard Labs,Long Down Avenue, Stoke Gifford, Bristol, BS34 8QZ, UK
基金
中国国家自然科学基金; 国家重点基础研究发展计划(973计划);
关键词
identity-based encryption; Fujisaki-Okamoto transformation; provable security; cascading reduction;
D O I
暂无
中图分类号
TP309.7 [加密与解密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash functions of the original BF-IBE. Compared with prior proofs, our new proof provides a tighter security reduction and minimizes the use of random oracles, thus indicates BF-IBE has better provable security with our new choices of hash functions. The techniques developed in our proof can also be applied to improving security analysis of some other IBE schemes. As an independent technical contribution, we also give a rigorous proof of the Fujisaki-Okamoto (FO) transformation in the case of CPA-to-CCA, which demonstrates the efficiency of the FO-transformation (CPA-to-CCA), in terms of the tightness of security reduction, has long been underestimated. This result can remarkably benefit the security proofs of encryption schemes using the FO-transformation for CPA-to-CCA enhancement.
引用
收藏
页码:1385 / 1401
页数:17
相关论文
共 50 条
  • [1] Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
    Chen Yu
    Chen LiQun
    Lin DongDai
    SCIENCE CHINA-MATHEMATICS, 2013, 56 (07) : 1385 - 1401
  • [2] Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
    Yu Chen
    LiQun Chen
    DongDai Lin
    Science China Mathematics, 2013, 56 : 1385 - 1401
  • [3] Reconsideration on the security of the Boneh-Franklin identity-based encryption scheme
    Nishioka, M
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 270 - 282
  • [4] Verifiable Security of Boneh-Franklin Identity-Based Encryption
    Barthe, Gilles
    Olmedo, Federico
    Zanella Beguelin, Santiago
    PROVABLE SECURITY, 2011, 6980 : 68 - 83
  • [5] Boneh-Franklin identity based encryption revisited
    Galindo, D
    AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 791 - 802
  • [6] Improving the Boneh-Franklin Traitor Tracing Scheme
    Junod, Pascal
    Karlov, Alexandre
    Lenstra, Arjen K.
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 88 - +
  • [7] SECURITY ANALYSIS OF A FUZZY IDENTITY-BASED ENCRYPTION SCHEME
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2014, 23 (03)
  • [8] Security of identity-based broadcast encryption
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
  • [9] Identity-Based Encryption with Forward Security
    Li, Hongwei
    Yang, Haomiao
    Li, Fan
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 287 - 290
  • [10] An identity-based encryption scheme for broadcasting
    Yang, Geng
    Wang, Jiangtao
    Cheng, Hongbing
    Rong, Chunming
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 123 - +