Tightly Secure Hierarchical Identity-Based Encryption

被引:9
|
作者
Langrehr, Roman [1 ,3 ]
Pan, Jiaxin [2 ,3 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
[2] NTNU Norwegian Univ Sci & Technol, Dept Math Sci, Trondheim, Norway
[3] Karlsruhe Inst Technol KIT, Karlsruhe, Germany
关键词
Hierarchical identity-based encryption; tight security; affine message authentication codes; IBE;
D O I
10.1007/s00145-020-09356-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length. The security reductions of previous HIBEs lose at least a factor of Q, which is the number of user secret key queries. Different to that, the security loss of our schemes is only dependent on the security parameter. Our schemes are adaptively secure based on the Matrix Diffie-Hellman assumption, which is a generalization of standard Diffie-Hellman assumptions such as k-Linear. We have two tightly secure constructions, one with constant ciphertext size, and the other with tighter security at the cost of linear ciphertext size. Among other things, our schemes imply the first tightly secure identity-based signature scheme by a variant of the Naor transformation.
引用
收藏
页码:1787 / 1821
页数:35
相关论文
共 50 条
  • [31] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption
    Liang, Kaitai
    Susilo, Willy
    Liu, Joseph K.
    Wong, Duncan S.
    [J]. Computer Journal, 2014, 58 (10): : 2778 - 2792
  • [32] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption
    Liang, Kaitai
    Susilo, Willy
    Liu, Joseph K.
    Wong, Duncan S.
    [J]. COMPUTER JOURNAL, 2015, 58 (10): : 2778 - 2792
  • [33] A Secure Email Encryption Proxy Based on Identity-based Cryptography
    Chen, Tieming
    Ma, Shilong
    [J]. 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 284 - 286
  • [34] Fully secure fuzzy identity-based encryption for secure IoT communications
    Mao, Yijun
    Li, Jin
    Chen, Min-Rong
    Liu, Jianan
    Xie, Congge
    Zhan, Yiju
    [J]. COMPUTER STANDARDS & INTERFACES, 2016, 44 : 117 - 121
  • [35] Hierarchical identity-based inner product functional encryption
    Song, Ge
    Deng, Yuqiao
    Huang, Qiong
    Peng, Changgen
    Tang, Chunming
    Wang, Xiaohua
    [J]. INFORMATION SCIENCES, 2021, 573 : 332 - 344
  • [36] Chosen-ciphertext secure hierarchical identity-based encryption from R-LWE
    Jiang, Xue-Feng
    Wang, Ting
    Sun, Zhi-Wei
    [J]. Journal of Computers (Taiwan), 2020, 31 (01): : 320 - 331
  • [38] Timed-Release Hierarchical Identity-Based Encryption
    Oshikiri, Toru
    Saito, Taiichi
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (11) : 148 - 154
  • [40] A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile Networks
    Wan, Zhiguo
    Ren, Kui
    Preneel, Bart
    [J]. WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 62 - 67