Direct chosen-ciphertext secure identity-based key encapsulation without random oracles

被引:0
|
作者
Kiltz, Eike [1 ]
Galindo, David
机构
[1] CWI, NL-1009 AB Amsterdam, Netherlands
[2] Radboud Univ Nijmegen, Nijmegen, Netherlands
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We describe a new and practical identity-based key encapsulation mechanism that is secure in the standard model against chosen-ciphertext (CCA2) attacks. Since our construction is direct and not based on generic transformations from hierarchical identity-based encryption, it is more efficient than all previously proposed schemes.
引用
收藏
页码:336 / 347
页数:12
相关论文
共 50 条
  • [1] Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
    Kiltz, Eike
    Galindo, David
    [J]. THEORETICAL COMPUTER SCIENCE, 2009, 410 (47-49) : 5093 - 5111
  • [2] Chosen-ciphertext secure threshold identity-based key encapsulation without random oracles
    Galindo, David
    Kiltz, Eike
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 173 - 185
  • [3] Chosen-Ciphertext Secure Multi-authority Fuzzy Identity-Based Key Encapsulation without ROM
    Fang, Liming
    Wang, Jiandong
    Ren, Yongjun
    Xia, Jinyue
    Bian, Shizhu
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 326 - 330
  • [4] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [5] Efficient chosen-ciphertext secure identity-based encryption with wildcards
    Birkett, James
    Dent, Alexander W.
    Neven, Gregory
    Schuldt, Jacob C. N.
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 274 - +
  • [6] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Li, Yan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 35 - 50
  • [7] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Weiran Liu
    Jianwei Liu
    Qianhong Wu
    Bo Qin
    Yan Li
    [J]. International Journal of Information Security, 2016, 15 : 35 - 50
  • [8] The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
    Choi, Seung Geol
    Herranz, Javier
    Hofheinz, Dennis
    Hwang, Jung Yeon
    Kiltz, Eike
    Lee, Dong Hoon
    Yung, Moti
    [J]. INFORMATION PROCESSING LETTERS, 2009, 109 (16) : 897 - 901
  • [9] Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model
    Xu, Shengfeng
    Li, Xiangxue
    [J]. IEEE ACCESS, 2021, 9 : 13683 - 13690
  • [10] Chosen ciphertext secure public key threshold encryption without random oracles
    Boneh, D
    Boyen, X
    Halevi, S
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 226 - 243