Tightly Secure Hierarchical Identity-Based Encryption

被引:9
|
作者
Langrehr, Roman [1 ,3 ]
Pan, Jiaxin [2 ,3 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
[2] NTNU Norwegian Univ Sci & Technol, Dept Math Sci, Trondheim, Norway
[3] Karlsruhe Inst Technol KIT, Karlsruhe, Germany
关键词
Hierarchical identity-based encryption; tight security; affine message authentication codes; IBE;
D O I
10.1007/s00145-020-09356-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length. The security reductions of previous HIBEs lose at least a factor of Q, which is the number of user secret key queries. Different to that, the security loss of our schemes is only dependent on the security parameter. Our schemes are adaptively secure based on the Matrix Diffie-Hellman assumption, which is a generalization of standard Diffie-Hellman assumptions such as k-Linear. We have two tightly secure constructions, one with constant ciphertext size, and the other with tighter security at the cost of linear ciphertext size. Among other things, our schemes imply the first tightly secure identity-based signature scheme by a variant of the Naor transformation.
引用
收藏
页码:1787 / 1821
页数:35
相关论文
共 50 条
  • [21] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [22] An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Jiang, Shengyi
    Wu, Jiayuan
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 506 - 515
  • [23] Secure Symmetric Key Fuzzy Identity-Based Encryption
    Liu, Pengtao
    [J]. MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2665 - 2668
  • [24] Forward-secure identity-based encryption scheme
    Yang, Hao-Miao
    Sun, Shi-Xin
    Li, Hong-Wei
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (03): : 534 - 537
  • [25] Forward-Secure Revocable Identity-Based Encryption
    Qin, Baodong
    Bai, Xue
    Zheng, Dong
    Cui, Hui
    Luo, Yiyuan
    [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 321 - 340
  • [26] A Tightly Secure Identity-Based Signature Scheme from Isogenies
    Chen, Jiawei
    Jo, Hyungrok
    Sato, Shingo
    Shikata, Junji
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 141 - 163
  • [27] On the General Construction of Tightly Secure Identity-Based Signature Schemes
    Wu, Ge
    Zhao, Zhen
    Guo, Fuchun
    Susilo, Willy
    Zhang, Futai
    [J]. COMPUTER JOURNAL, 2020, 63 (12): : 1835 - 1848
  • [28] Identity Based Group Signatures from Hierarchical Identity-Based Encryption
    Smart, Nigel P.
    Warinschi, Bogdan
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 150 - 170
  • [29] Fully Secure Identity-based Broadcast Encryption in the Subgroups
    Zhang Leyou
    Hu Yupu
    Wu Qing
    [J]. CHINA COMMUNICATIONS, 2011, 8 (02) : 152 - 158
  • [30] An efficient and full secure identity-based encryption scheme
    Ma, Rong
    Cao, Zhen-Fu
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (03): : 389 - 392