Tightly Secure Hierarchical Identity-Based Encryption

被引:9
|
作者
Langrehr, Roman [1 ,3 ]
Pan, Jiaxin [2 ,3 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
[2] NTNU Norwegian Univ Sci & Technol, Dept Math Sci, Trondheim, Norway
[3] Karlsruhe Inst Technol KIT, Karlsruhe, Germany
关键词
Hierarchical identity-based encryption; tight security; affine message authentication codes; IBE;
D O I
10.1007/s00145-020-09356-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length. The security reductions of previous HIBEs lose at least a factor of Q, which is the number of user secret key queries. Different to that, the security loss of our schemes is only dependent on the security parameter. Our schemes are adaptively secure based on the Matrix Diffie-Hellman assumption, which is a generalization of standard Diffie-Hellman assumptions such as k-Linear. We have two tightly secure constructions, one with constant ciphertext size, and the other with tighter security at the cost of linear ciphertext size. Among other things, our schemes imply the first tightly secure identity-based signature scheme by a variant of the Naor transformation.
引用
收藏
页码:1787 / 1821
页数:35
相关论文
共 50 条
  • [1] Tightly Secure Hierarchical Identity-Based Encryption
    Roman Langrehr
    Jiaxin Pan
    [J]. Journal of Cryptology, 2020, 33 : 1787 - 1821
  • [2] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Han, Shuai
    Liu, Shengli
    Qin, Baodong
    Gu, Dawu
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (03) : 517 - 554
  • [3] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Shuai Han
    Shengli Liu
    Baodong Qin
    Dawu Gu
    [J]. Designs, Codes and Cryptography, 2018, 86 : 517 - 554
  • [4] Adaptively Secure Hierarchical Identity-Based Encryption over Lattice
    Zhang, Leyou
    Wu, Qing
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 46 - 58
  • [5] Tightly Secure Identity-Based Multisignatures
    Yanai, Naoto
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2017,
  • [6] Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
    Seo, Jae Hong
    Emura, Keita
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 21 - 38
  • [7] Secure and practical identity-based encryption
    Naccache, D.
    [J]. IET INFORMATION SECURITY, 2007, 1 (02) : 59 - 64
  • [8] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62
  • [9] Toward hierarchical identity-based encryption
    Horwitz, J
    Lynn, B
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 466 - 481
  • [10] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257