On the Anonymity of Identity-Based Encryption

被引:0
|
作者
Luo, Song [1 ]
Hu, Ning [2 ]
机构
[1] Chongqing Univ Technol, Coll Comp Sci & Engn, Chongqing 400054, Peoples R China
[2] Kai Feng Culture & Arts Coll, Kaifeng 475000, Peoples R China
关键词
DUAL SYSTEM ENCRYPTION; PUBLIC-KEY ENCRYPTION; CONSISTENCY PROPERTIES; IBE; HIBE;
D O I
10.1155/2013/217480
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Anonymity of identity-based encryption (IBE) means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems. We found that the current definition of anonymity is obscure to describe some IBE systems, such as Gentry IBE system. Furthermore, current definition cannot express the degree of anonymity. So we divide the degree of anonymity into weak anonymity and strong anonymity based on indistinguishability between different games. For weakly anonymous IBE systems, the target identity in a ciphertext cannot be distinguished from a random identity. For strongly anonymous IBE systems, the whole ciphertext cannot be distinguished from a random tuple. We also discuss the type of anonymity and divide it into two types. Type 1 means that a random tuple can be seen as a valid ciphertext, while type 2 cannot. Based on our new definitions, we show that three famous IBE systems, Gentry IBE system, Boyen-Waters IBE system, and Lewko IBE system, have strong but different types of anonymity.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] New Anonymity Notions for Identity-Based Encryption
    Izabachene, Malika
    Pointcheval, David
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 375 - 391
  • [2] New Anonymity Notions for Identity-Based Encryption
    Izabachene, Malika
    Pointcheval, David
    [J]. FORMAL TO PRACTICAL SECURITY, 2009, 5458 : 138 - 157
  • [3] Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
    Paterson, Kenneth G.
    Srinivasan, Sriramkrishnan
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2008, 2008, 5209 : 354 - 375
  • [4] Relations between semantic security and anonymity in identity-based encryption
    Herranz, Javier
    Laguillaumie, Fabien
    Rafols, Carla
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 453 - 460
  • [5] Efficient Identity-Based Encryption with Tight Adaptive Anonymity from RLWE
    Tomita, Toi
    Shikata, Junji
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT I, 2024, 14771 : 300 - 321
  • [6] Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity
    Zhang, Yinghui
    Yang, Menglei
    Zheng, Dong
    Zhang, Tiantian
    Guo, Rui
    Ren, Fang
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 665 - 681
  • [7] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [8] On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation
    Tseng, Yi-Fan
    Fan, Chun-, I
    Sung, Cheng-Wei
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 493 - 509
  • [9] Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition
    Hanaoka, Goichiro
    Komatsu, Misaki
    Ohara, Kazuma
    Sakai, Yusuke
    Yamada, Shota
    [J]. COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 65 - 85
  • [10] Wildcarded Identity-Based Encryption
    Michel Abdalla
    James Birkett
    Dario Catalano
    Alexander W. Dent
    John Malone-Lee
    Gregory Neven
    Jacob C. N. Schuldt
    Nigel P. Smart
    [J]. Journal of Cryptology, 2011, 24 : 42 - 82