Tightly Secure Hierarchical Identity-Based Encryption

被引:9
|
作者
Langrehr, Roman [1 ,3 ]
Pan, Jiaxin [2 ,3 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
[2] NTNU Norwegian Univ Sci & Technol, Dept Math Sci, Trondheim, Norway
[3] Karlsruhe Inst Technol KIT, Karlsruhe, Germany
关键词
Hierarchical identity-based encryption; tight security; affine message authentication codes; IBE;
D O I
10.1007/s00145-020-09356-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length. The security reductions of previous HIBEs lose at least a factor of Q, which is the number of user secret key queries. Different to that, the security loss of our schemes is only dependent on the security parameter. Our schemes are adaptively secure based on the Matrix Diffie-Hellman assumption, which is a generalization of standard Diffie-Hellman assumptions such as k-Linear. We have two tightly secure constructions, one with constant ciphertext size, and the other with tighter security at the cost of linear ciphertext size. Among other things, our schemes imply the first tightly secure identity-based signature scheme by a variant of the Naor transformation.
引用
收藏
页码:1787 / 1821
页数:35
相关论文
共 50 条
  • [41] Generalized key delegation for hierarchical identity-based encryption
    Abdalla, Michel
    Kiltz, Eike
    Neven, Gregory
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 139 - 154
  • [42] Generalised key delegation for hierarchical identity-based encryption
    Abdalla, M.
    Kiltz, E.
    Neven, G.
    [J]. IET INFORMATION SECURITY, 2008, 2 (03) : 67 - 78
  • [43] Private Key Management in Hierarchical Identity-Based Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Guo, Fuchun
    [J]. SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 206 - 212
  • [44] Unbounded Hierarchical Identity-based Encryption in the Standard Model
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    Yang, Yang
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (01): : 105 - 112
  • [45] Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 45 - 56
  • [46] Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Shao, Jun
    Cao, Zhenfu
    [J]. INFORMATION SCIENCES, 2012, 206 : 83 - 95
  • [47] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [48] Generic Construction of Forward-Secure Identity-Based Encryption
    Lu, Yang
    Li, Jiguo
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (12) : 3068 - 3074
  • [49] Secure pseudonym management using mediated identity-based encryption
    Candebat, Thibault
    Gray, David
    [J]. JOURNAL OF COMPUTER SECURITY, 2006, 14 (03) : 249 - 267
  • [50] CCA-Secure Deterministic Identity-Based Encryption Scheme
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Liang, Kaitai
    Xue, Liang
    Yang, Xiaoyi
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 245 - 269